USRE47019E1 - Methods for DNSSEC proxying and deployment amelioration and systems thereof - Google Patents

Methods for DNSSEC proxying and deployment amelioration and systems thereof Download PDF

Info

Publication number
USRE47019E1
USRE47019E1 US15/286,436 US201615286436A USRE47019E US RE47019 E1 USRE47019 E1 US RE47019E1 US 201615286436 A US201615286436 A US 201615286436A US RE47019 E USRE47019 E US RE47019E
Authority
US
United States
Prior art keywords
domain name
response
dnssec
resource record
traffic management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
US15/286,436
Inventor
Peter M. Thornewell
Christopher R. Baker
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
F5 Inc
Original Assignee
F5 Networks Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by F5 Networks Inc filed Critical F5 Networks Inc
Priority to US15/286,436 priority Critical patent/USRE47019E1/en
Application granted granted Critical
Publication of USRE47019E1 publication Critical patent/USRE47019E1/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L61/1511
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Definitions

  • This technology generally relates to securing network applications, and more particularly, to systems and methods for Domain Name System Security Extensions (DNSSEC) proxying and deployment amelioration.
  • DNSSEC Domain Name System Security Extensions
  • DNS Global Internet Domain Name System
  • IP Internet Protocol
  • DNS cache poisoning When a client device inputs a Uniform Resource Locator (URL) into a client browser, a DNS resolver checks the Internet for the proper name/number translation and location. Typically, DNS will accept the first response or answer obtained without question and direct the client device to the site referred to in the response. The server receiving the DNS response will also cache that information for a period of time until it expires, so upon the next request for that name/number, the site is immediately delivered to the requesting client device.
  • URL Uniform Resource Locator
  • DNSSEC Domain Name System Security Extensions
  • Deploying DNSSEC involves signing zones with public/private key encryption and returning DNS responses with signatures.
  • a client's trust in the signatures is based on the chain of trust established across administrative boundaries, from parent to child zone, using a Domain Name System Key (DNSKEY) and delegation signer (DS) resource records, which were not defined in DNS specifications.
  • DNSSEC since an unbroken chain of trust is established from the root at the top through the top-level domain (TLD) and down to individual registrants, the client device's answer always receives an authenticated response. All zones are authenticated by “signing,” in that a publisher of a zone signs that zone prior to publication, and the parent of that zone publishes the keys of that zone.
  • GSLB global server load balancing
  • IP Internet Protocol
  • One example of the technology is a method for providing authenticated domain name service.
  • the method includes forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device.
  • the traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers.
  • the traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.
  • Another example includes a computer readable medium having stored thereon instructions for providing authenticated domain name service, which when executed by at least one processor, causes the processor to perform a number of steps.
  • the steps include forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device.
  • the traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers.
  • the traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.
  • a traffic management device which includes one or more processors executing one or more traffic management applications, a memory coupled to the one or more processors by a bus, a network interface controller coupled to the one or more processors and the memory and configured to receive data packets from a network that relate to the executing traffic management applications, and provide authenticated domain name service.
  • at least one of the one or more processors is configured to execute programmed instructions stored in the memory and the network interface controller including logic capable of being further configured to implement forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device.
  • the traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers.
  • the traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.
  • the examples offer numerous advantages.
  • technology disclosed enables signing DNS responses in real time and deploying DNSSEC quickly and easily in an existing network environment, thereby ensuring that answers to domain name requests received by the client devices when asking for name resolution come from a trusted name server, and not a hacker.
  • the examples support Federal Information Processing Standard (FIPS) storage of the private keys, and are able to securely synchronize the keys between multiple FIPS devices.
  • FIPS Federal Information Processing Standard
  • examples of the disclosed technology use a cryptographic module or storage chip on a motherboard of a traffic management device to secure a unique hardware key as part of the multi-layer encryption process.
  • a response from a non-DNSSEC server is returned, the response is signed in real time to ensure continuous signing. The potential attacker cannot forge the signed response without the corresponding private key.
  • the examples enable compliance with federal DNSSEC mandates and help protect valuable domain names and web properties from rogue servers sending invalid responses.
  • the examples of the technology enable global server load balancing (GSLB)-type DNSSEC responses in which the IP answer can change depending on the requesting client by signing answers at the time the traffic management device (with load balancing functionality) decides what the answer to a request should be.
  • GSLB global server load balancing
  • FIG. 1 illustrates an exemplary network system environment using traffic management device for DNSSEC proxying and deployment amelioration
  • FIG. 2 is a partly schematic and partly functional block diagram of traffic management device in the exemplary network environment of FIG. 1 ;
  • FIG. 3 is a flow chart of an exemplary process and method for DNSSEC proxying and deployment amelioration when a DNSSEC request is to be serviced using non-DNSSEC server devices.
  • Traffic management device 110 to handle mismatches between non-DNSSEC and DNSSEC environments.
  • client devices operating in a DNSSEC environment need to communicate with servers operating in a non-DNSSEC environment.
  • Traffic management device 110 provides secure conversion from one environment to another and prevents malicious “man-in-the-middle” attacks.
  • an exemplary network system 100 including traffic management device 110 that is configured to provide authenticated domain name service, for example, to requesting client computers 104 ( 1 ) to 104 (n) is illustrated.
  • a network 112 can provide responses and requests according to the Hyper-Text Transfer Protocol (HTTP) based application, request for comments (RFC) document guidelines or the Common Internet File System (CIFS) or network file system (NFS) protocol in this example, although the principles discussed herein are not limited to these examples and can include other application protocols and other types of requests (e.g., File Transfer Protocol (FTP) based requests).
  • the exemplary network system 100 can include a series of one or more client devices such as client computers 104 ( 1 ) to 104 (n).
  • Client computers 104 ( 1 )- 104 (n) are coupled to traffic management device 110 via a local domain name server (LDNS) 106 .
  • LDNS 106 is optional and client computers 104 ( 1 )- 104 (n) are coupled to traffic management device 110 directly or via a network 112 .
  • Traffic management device 110 is interposed in between servers 102 ( 1 ) to 102 (n) and the client devices 104 ( 1 ) to 104 (n) for providing one or more communication channels through network 112 and a Local Area Network (LAN) 114 , although other communication channels may be directly established between various devices in network system 100 without network 112 and/or LAN 114 .
  • LAN Local Area Network
  • server devices 102 1 and 102 (n) are shown, but it should be understood that any number of server devices can use the exemplary network system 100 .
  • client devices 104 ( 1 )- 104 (n), one LDNS 106 , and one traffic management device 110 are shown in FIG. 1 , but any number of client devices, LDNSs, and traffic management devices can also use the exemplary network system 100 as well.
  • network 112 and LAN 114 are shown, other numbers and types of networks could be used.
  • the ellipses and the designation “n” denote an unlimited number of server devices and client devices, respectively.
  • Servers 102 ( 1 )- 102 (n) comprise one or more server computing machines or devices capable of operating one or more Web-based applications that may be accessed by network devices in the network 112 , such as client computers 104 ( 1 )- 104 (n) (also referred to as client devices 104 ( 1 )- 104 (n)), via traffic management device 110 , and may provide other data representing requested resources, such as domain name services and zones, particular Web page(s) corresponding to URL request(s), image(s) of physical objects, and any other objects, responsive to the requests, although the servers 102 ( 1 )- 102 (n) may perform other tasks and provide other types of resources.
  • client computers 104 ( 1 )- 104 (n) also referred to as client devices 104 ( 1 )- 104 (n)
  • traffic management device 110 may provide other data representing requested resources, such as domain name services and zones, particular Web page(s) corresponding to URL request(s), image(s) of physical objects, and any other objects, responsive to the
  • servers 102 ( 1 ) and 102 (n) are shown in the network system 100 depicted in FIG. 1 , other numbers and types of servers may be coupled to the traffic management device 110 . It is also contemplated that one or more of the servers 102 ( 1 )- 102 (n) may be a cluster of servers managed by a network traffic management device such as traffic management device 110 .
  • servers 102 ( 1 )- 102 (n) are DNS servers in a DNS environment.
  • servers 102 ( 1 )- 102 (n) are DNSSEC servers in a DNSSEC environment.
  • servers 102 ( 1 )- 102 (n) are a mix of DNS and DNSSEC servers, as can be understood by those of ordinary skill in the art upon reading this disclosure.
  • servers 102 ( 1 )- 102 (n) are Berkeley Internet Name Domain (BIND) servers.
  • the client computers 104 ( 1 )- 104 (n) in this example can run interface applications such as Web browsers that can provide an interface to make requests for and send data, including DNS and DNSSEC requests, to different Web server-based applications via LDNS 106 connected to the network 112 and/or via traffic management device 110 .
  • interface applications such as Web browsers that can provide an interface to make requests for and send data, including DNS and DNSSEC requests, to different Web server-based applications via LDNS 106 connected to the network 112 and/or via traffic management device 110 .
  • a series of network applications can run on the servers 102 ( 1 )- 102 (n) that allow the transmission of data that is requested by the client computers 104 ( 1 )- 104 (n).
  • Servers 102 ( 1 )- 102 (n) can provide data or receive data in response to requests directed toward the respective applications on the servers 102 ( 1 )- 102 (n) from the client computers 104 ( 1 )- 104 (n). For example, as per the Transmission Control Protocol (TCP), packets can be sent to the servers 102 ( 1 )- 102 (n) from the requesting client computers 104 ( 1 )- 104 (n) to send data, although other protocols (e.g., FTP) may be used.
  • TCP Transmission Control Protocol
  • packets can be sent to the servers 102 ( 1 )- 102 (n) from the requesting client computers 104 ( 1 )- 104 (n) to send data, although other protocols (e.g., FTP) may be used.
  • the servers 102 ( 1 )- 102 (n) can be hardware or software executing on and supported by hardware, or can represent a system with multiple servers, which can include internal or external networks.
  • Servers 102 ( 1 )- 102 (n) can be domain name servers with DNS capabilities hosting one or more website zones.
  • servers 102 ( 1 )- 102 (n) can be DNSSEC servers in a DNSSEC environment hosting one or more website zones.
  • the servers 102 ( 1 )- 102 (n) can be any BIND version of Microsoft Domain Controllers provided by Microsoft Corporation of Redmond, Wash., although other types of servers can be used.
  • additional servers can be coupled to the network 112 and/or LAN 114 and many different types of applications can be available on servers coupled to the network 112 and/or LAN 114 .
  • the client devices such as the client computers 104 ( 1 )- 104 (n) can include virtually any computing device capable of connecting to another computing device to send and receive information, including Web-based information.
  • the set of such devices can include devices that typically connect using a wired (and/or wireless) communications medium, such as personal computers (e.g., desktops, laptops), mobile and/or smart phones and the like.
  • the client devices can run browsers and other types of applications (e.g., web-based applications) that can provide an interface to make one or more requests to different server-based applications via network 112 , although requests for other types of network applications and resources, for example URLs, may be made by client computers 104 ( 1 )- 104 (n).
  • Client computers 104 ( 1 )- 104 (n) can be configured to make DNSSEC and non-DNSSEC requests to servers 102 ( 1 )- 102 (n), or other types of traffic management devices (e.g., routers, load balancers, application delivery controllers, and the like).
  • traffic management devices e.g., routers, load balancers, application delivery controllers, and the like.
  • Client computers 104 ( 1 )- 104 (n) can submit requests to LDNS 106 .
  • LDNS 106 can respond to the requests when resources are locally stored on LDNS 106 , for example, in a local cache memory.
  • a client computer may request for a URL www.example.com. If LDNS 106 has a valid copy of www.example.com, it can directly provide this URL to the requesting client computer.
  • LDNS 106 forwards the requests to traffic management device 110 via network 112 .
  • LDNS 106 can be configured to expedite requests for network resources (e.g., URLs) based upon a history of requests from one or more client computers 104 ( 1 )- 104 (n).
  • LDNS 106 can provide an initial response to a requesting one of client computers 104 ( 1 )- 104 (n) while additional resources are being fetched from severs 102 ( 1 )- 102 (n) resulting in a faster initial response for a request from client computers 104 ( 1 )- 104 (n).
  • LDNS 106 can be a proxy server, or a server similar to servers 102 ( 1 )- 102 (n) but located between client computers 104 ( 1 )- 104 (n) and traffic management device 110 .
  • a series of Web-based and/or other types of protected and unprotected network applications can run on servers 102 ( 1 )- 102 (n) that allow the transmission of data that is requested by the client computers 104 ( 1 )- 104 (n).
  • the client computers 104 ( 1 )- 104 (n) can be further configured to engage in a secure communication directly with the traffic management device 110 and/or the servers 102 ( 1 )- 102 (n), via LDNS 106 , or otherwise, using mechanisms such as Secure Sockets Layer (SSL), Internet Protocol Security (IPSec), Transport Layer Security (TLS), and the like.
  • SSL Secure Sockets Layer
  • IPSec Internet Protocol Security
  • TLS Transport Layer Security
  • network 112 comprises a publicly accessible network, such as the Internet, which includes client computers 104 ( 1 )- 104 (n), although network 112 may comprise other types of private and public networks that include other devices. Communications, such as requests from client computers 104 ( 1 )- 104 (n) and responses from servers 102 ( 1 )- 102 (n), take place over network 112 according to standard network protocols, such as the HTTP and TCP/IP protocols in this example, but the principles discussed herein are not limited to this example and can include other protocols (e.g., FTP). Further, network 112 can include local area networks (LANs), wide area networks (WANs), direct connections, other types and numbers of network types, and any combination thereof.
  • LANs local area networks
  • WANs wide area networks
  • direct connections other types and numbers of network types, and any combination thereof.
  • network 112 includes any communication medium and method by which data may travel between client devices 104 ( 1 )- 104 (n), servers 102 ( 1 )- 102 (n), and traffic management device 110 , and these devices are provided by way of example only.
  • each of the servers 102 ( 1 )- 102 (n), traffic management device 110 , LDNS 106 , and client computers 104 ( 1 )- 104 (n) can include a central processing unit (CPU), controller or processor, a memory, and an interface system which are coupled together by a bus or other link, although other numbers and types of each of the components and other configurations and locations for the components can be used. Since these devices are well known to those of ordinary skill in the relevant art(s), they will not be described in further detail herein.
  • the network system 100 can also be implemented on a computer system or systems that extend across any network environment using any suitable interface mechanisms and communications technologies including, for example telecommunications in any suitable form (e.g., voice, modem, and the like), Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, combination(s) thereof, and the like.
  • PSTNs Public Switched Telephone Network
  • PDNs Packet Data Networks
  • the Internet intranets, combination(s) thereof, and the like.
  • LAN 114 comprises a private local area network that includes the traffic management device 110 coupled to the one or more servers 102 ( 1 )- 102 (n), although the LAN 114 may comprise other types of private and public networks with other devices.
  • the traffic management device 110 can be interposed between the network 112 and the servers 102 ( 1 )- 102 (n) coupled via LAN 114 as shown in FIG. 1 .
  • the network system 100 could be arranged in other manners with other numbers and types of devices.
  • the traffic management device 110 is coupled to network 112 by one or more network communication links, and intermediate network devices, such as routers, switches, gateways, hubs, crossbars, and other devices. It should be understood that the devices and the particular configuration shown in FIG. 1 are provided for exemplary purposes only and thus are not limiting.
  • traffic management device 110 may be coupled in series and/or parallel to the traffic management device 110 , thereby forming a cluster, depending upon specific applications, and the single traffic management device 110 shown in FIG. 1 is by way of example only, and not by way of limitation.
  • the traffic management device 110 manages network communications, which may include one or more client requests and server responses, to/from the network 112 between the client computers 104 ( 1 )- 104 (n) and one or more of the servers 102 ( 1 )- 102 (n) in LAN 114 in these examples. These requests may be destined for one or more servers 102 ( 1 )- 102 (n), and, as alluded to earlier, may take the form of one or more TCP/IP data packets originating from the network 112 , passing through one or more intermediate network devices and/or intermediate networks, until ultimately reaching the traffic management device 110 , for example.
  • network communications may include one or more client requests and server responses, to/from the network 112 between the client computers 104 ( 1 )- 104 (n) and one or more of the servers 102 ( 1 )- 102 (n) in LAN 114 in these examples. These requests may be destined for one or more servers 102 ( 1 )- 102 (n), and, as alluded to earlier,
  • traffic management device 110 is configured as a global server load balancing device that distributes end-user application requests based on business policies, data center conditions, network conditions, user location, and application performance, such that each request from client computers 104 ( 1 )- 104 (n) is automatically directed to the closest or best-performing data center hosting one or more servers 102 ( 1 )- 102 (n).
  • traffic management device 110 provides DNSSEC signed responses even when zone names have been dynamically updated.
  • traffic management device 110 has global server load balancing capabilities, in alternative examples traffic management device 110 may receive responses from a global server load balancing (GSLB) device coupled to LAN 114 .
  • GSLB global server load balancing
  • GSLB global server load balancing
  • GSLB global server load balancing
  • such a global load balancing device can be a BIG-IP® Global Traffic ManagerTM provided by F5 Networks, Inc., of Seattle, Wash.
  • traffic management device 110 is configured to provide authenticated domain name service.
  • the traffic management device 110 may manage the network communications by performing several network traffic management related functions involving network communications, secured or unsecured, such as load balancing, access control, VPN hosting, network traffic acceleration, encryption, decryption, cookie, and key management and providing authenticated domain name service in accordance with the systems and processes described further below in connection with FIGS. 2-3 , for example.
  • an exemplary traffic management device 110 is illustrated. Included within the traffic management device 110 is a system bus 26 (also referred to as bus 26 ) that communicates with a host system 18 via a bridge 25 and with an input-output (I/O) device 30 . In this example, a single I/O device 30 is shown to represent any number of I/O devices connected to bus 26 .
  • bridge 25 is in further communication with a host processor 20 via host input output (I/O) ports 29 .
  • Host processor 20 can further communicate with a network interface controller 24 via a CPU bus 202 , a host memory 22 (via a memory port 53 ), and a cache memory 21 . As outlined above, included within the host processor 20 are host I/O ports 29 , memory port 53 , and a main processor (not shown separately).
  • host system 18 includes a cryptography module 208 .
  • traffic management device 110 can include the host processor 20 characterized by anyone of the following component configurations: computer readable medium and logic circuits that respond to and process instructions fetched from the host memory 22 ; a microprocessor unit, such as: those manufactured by Intel Corporation of Santa Clara, Calif.; those manufactured by Motorola Corporation of Schaumburg, Ill.; those manufactured by Transmeta Corporation of Santa Clara, Calif.; the RS/6000 processor such as those manufactured by International Business Machines of Armonk, N.Y.; a processor such as those manufactured by Advanced Micro Devices of Sunnyvale, Calif.; or any other combination of logic circuits capable of executing the systems and methods described herein.
  • a microprocessor unit such as: those manufactured by Intel Corporation of Santa Clara, Calif.; those manufactured by Motorola Corporation of Schaumburg, Ill.; those manufactured by Transmeta Corporation of Santa Clara, Calif.
  • the RS/6000 processor such as those manufactured by International Business Machines of Armonk, N.Y.
  • a processor such as those manufactured by Advanced Micro Devices
  • the host processor 20 can include any combination of the following: a microprocessor, a microcontroller, a central processing unit with a single processing core, a central processing unit with two processing cores, or a central processing unit with more than one processing core.
  • traffic management device 110 examples include one or more application delivery controller devices of the BIG-IP® product family provided by F5 Networks, Inc. of Seattle, Wash., although other types of traffic management devices may be used.
  • traffic management device 110 can include the host processor 20 that communicates with cache memory 21 via a secondary bus also known as a backside bus, while another example of the traffic management device 110 includes the host processor 20 that communicates with cache memory 21 via the system bus 26 .
  • the local system bus 26 can, in some examples, also be used by the host processor 20 to communicate with more than one type of I/O devices 30 .
  • the local system bus 26 can be anyone of the following types of buses: a VESA VL bus; an ISA bus; an EISA bus; a Micro Channel Architecture (MCA) bus; a PCI bus; a PCI-X bus; a PCI-Express bus; or a NuBus.
  • Other example configurations of the traffic management device 110 include I/O device 30 that is a video display (not shown separately) that communicates with the host processor 20 via an Advanced Graphics Port (AGP).
  • Still other versions of the traffic management device 110 include host processor 20 connected to I/O device 30 via any one or more of the following connections: HyperTransport, Rapid I/O, or InfiniBand.
  • traffic management device 110 include a communication connection where the host processor 20 communicates with one I/O device 30 using a local interconnect bus and with a second I/O device (not shown separately) using a direct connection.
  • the traffic management device 110 includes each of host memory 22 and cache memory 21 .
  • the cache memory 21 will, in some examples, be any one of the following types of memory: SRAM; BSRAM; or EDRAM.
  • cache memory 21 and host memory 22 can be anyone of the following types of memory: Static random access memory (SRAM), Burst SRAM or SynchBurst SRAM (BSRAM), Dynamic random access memory (DRAM), Fast Page Mode DRAM (FPM DRAM), Enhanced DRAM (EDRAM), Extended Data Output RAM (EDO RAM), Extended Data Output DRAM (EDO DRAM), Burst Extended Data Output DRAM (BEDO DRAM), Enhanced DRAM (EDRAM), synchronous DRAM (SDRAM), JEDECSRAM, PCIOO SDRAM, Double Data Rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), SyncLink DRAM (SLDRAM), Direct Rambus DRAM (DRDRAM), Ferroelectric RAM (FRAM), or any other type of memory device capable of executing the systems and methods described herein.
  • SRAM Static random access memory
  • DRAM Burst SRAM or SynchBurst SRAM
  • DRAM Dynamic random access memory
  • FPM DRAM Fast Page Mode DRAM
  • EDRAM
  • the host memory 22 and/or the cache memory 21 can, in some examples, include one or more memory devices capable of storing data and allowing any storage location to be directly accessed by the host processor 20 . Such storage of data can be in a local database internal to traffic management device 110 , or external to traffic management device 110 coupled via one or more input output ports of network interface controller 24 . Further examples of traffic management device 110 include a host processor 20 that can access the host memory 22 via one of either: system bus 26 ; memory port 53 ; or any other connection, bus or port that allows the host processor 20 to access host memory 22 .
  • One example of the traffic management device 110 provides support for anyone of the following installation devices: a floppy disk drive for receiving floppy disks such as 3.5-inch, 5.25-inch disks or ZIP disks, a CD-ROM drive, a CD-R/RW drive, a DVD-ROM drive, tape drives of various formats, USB device, a bootable medium, a bootable CD, a bootable compact disk (CD) for GNU/Linux distribution such as KNOPPIX®, a hard-drive or any other device suitable for installing applications or software.
  • Applications can, in some examples, include a client agent, or any portion of a client agent.
  • the traffic management device 110 may further include a storage device (not shown separately) that can be either one or more hard disk drives, or one or more redundant arrays of independent disks; where the storage device is configured to store an operating system, software, programs applications, or at least a portion of the client agent.
  • a further example of the traffic management device 110 includes an installation device that is used as the storage device.
  • the traffic management device 110 can include network interface controller 24 to communicate, via an input-output port inside network interface controller 24 , with a Local Area Network (LAN), Wide Area Network (WAN) or the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., 802.11, T1, T3, 56 kb, X.25, SNA, DECNET), broadband connections (e.g., ISDN, Frame Relay, ATM, Gigabit Ethernet, Ethernet-over-SONET), wireless connections, optical connections, or some combination of any or all of the above.
  • LAN Local Area Network
  • WAN Wide Area Network
  • the Internet can include network interface controller 24 to communicate, via an input-output port inside network interface controller 24 , with a Local Area Network (LAN), Wide Area Network (WAN) or the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., 802.11, T1, T3, 56 kb, X.25, SNA,
  • Connections can also be established using a variety of communication protocols (e.g., TCP/IP, IPX, SPX, NetBIOS, Ethernet, ARCNET, SONET, SDH, Fiber Distributed Data Interface (FDDI), RS232, RS485, IEEE 802.11, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, CDMA, GSM, WiMax and direct asynchronous connections).
  • One version of the traffic management device 110 includes network interface controller 24 configured to communicate with additional computing devices via any type and/or form of gateway or tunneling protocol such as Secure Socket Layer (SSL) or Transport Layer Security (TLS), or the Citrix Gateway Protocol manufactured by Citrix Systems, Inc. of Fort Lauderdale, Fla.
  • Versions of the network interface controller 24 can comprise anyone of: a built-in network adapter; a network interface card; a PCMCIA network card; a card bus network adapter; a wireless network adapter; a USB network adapter; a modem; or any other device suitable for interfacing the traffic management device 110 to a network capable of communicating and performing the methods and systems described herein.
  • the traffic management device 110 can include any one of the following I/O devices 30 : a keyboard; a pointing device; a mouse; a gesture based remote control device; a biometric device; an audio device; track pads; an optical pen; trackballs; microphones; drawing tablets; video displays; speakers; inkjet printers; laser printers; and dye sublimation printers; or any other input/output device able to perform the methods and systems described herein.
  • Host I/O ports 29 may in some examples connect to multiple I/O devices 30 to control the one or more I/O devices 30 .
  • I/O devices 30 may be configured to provide storage or an installation medium, while others may provide a universal serial bus (USB) interface for receiving USB storage devices such as the USB Flash Drive line of devices manufactured by Twintech Industry, Inc.
  • USB universal serial bus
  • Still other examples of an I/O device 30 may be bridge 25 between the system bus 26 and an external communication bus, such as: a USB bus; an Apple Desktop Bus; an RS-232 serial connection; a SCSI bus; a FireWire bus; a FireWire 800 bus; an Ethernet bus; an AppleTalk bus; a Gigabit Ethernet bus; an Asynchronous Transfer Mode bus; a HIPPI bus; a Super HIPPI bus; a SerialPlus bus; a SCI/LAMP bus; a FibreChannel bus; or a Serial Attached small computer system interface bus.
  • traffic management device 110 includes cryptography module 208 integrated as part of host system 18 for carrying out various exemplary functions of storing private and public keys.
  • cryptography module 208 may be a part of an autonomous application security manager module integrated with or communicating independently with the traffic management device 110 .
  • An exemplary application security manager is the BIG-IP® Application Security ManagerTM provided by F5 Networks, Inc. of Seattle, Wash.
  • cryptography module 208 includes a crypto-storage chip on the motherboard to secure one or more unique hardware keys as part of the multi-layer encryption process employed by traffic management device 110 to secure keys.
  • components of traffic management device 110 include one or more processors (e.g., host processor 20 ) executing one or more traffic management applications, memory (e.g., cache memory 21 , and/or host memory 22 ) coupled to the one or more processors by a bus, network interface controller 24 coupled to the one or more processors and the host memory 22 and configured to receive data packets from a network that relate to the executing traffic management applications, and provide authenticated domain name service.
  • processors e.g., host processor 20
  • memory e.g., cache memory 21 , and/or host memory 22
  • network interface controller 24 coupled to the one or more processors and the host memory 22 and configured to receive data packets from a network that relate to the executing traffic management applications, and provide authenticated domain name service.
  • At least one of the one or more processors is configured to execute programmed instructions stored in the memory (e.g., cache memory 21 , and/or host memory 22 ) and the network interface controller 24 including logic capable of being further configured to implement forwarding at traffic management device 110 a request for a domain name from a client device (e.g., one or more of client computers 104 ( 1 )- 104 (n)) to one or more servers (e.g., servers 102 ( 1 )- 102 (n)) coupled to traffic management device 110 .
  • the traffic management device 110 receives a first response comprising at least a portion of the domain name from the one or more servers 102 ( 1 )- 102 (n).
  • the traffic management device 110 attaches a first signature to the first response when the first response is determined by the traffic management device 110 to be an unauthenticated response, and provides the first response with the first signature to the client device (e.g., one or more of client computers 104 ( 1 )- 104 (n)).
  • client device e.g., one or more of client computers 104 ( 1 )- 104 (n)
  • the flowchart 300 is representative of example machine readable instructions for implementing in dynamic real-time authenticated domain name service, for example, at the traffic management device 110 .
  • the machine readable instructions comprise an algorithm for execution by: (a) a processor (e.g., host processor 20 ), (b) a controller, and/or (c) one or more other suitable processing device(s) within host system 18 , for example.
  • the algorithm may be implemented in software stored on tangible computer readable media such as, for example, a flash memory, a CD-ROM, a floppy disk, a hard drive, a digital video (versatile) disk (DVD), or other memory devices, but persons of ordinary skill in the art will readily appreciate that the entire algorithm and/or parts thereof could alternatively be executed by a device other than a processor and/or implemented in firmware or dedicated hardware in a well known manner (e.g., it may be implemented by an application specific integrated circuit (ASIC), a programmable logic device (PLD), a field programmable logic device (FPLD), a field programmable gate array (FPGA), discrete logic, or the like).
  • ASIC application specific integrated circuit
  • PLD programmable logic device
  • FPLD field programmable logic device
  • FPGA field programmable gate array
  • the components of the traffic management device 110 could be implemented by software, hardware, and/or firmware.
  • some or all of the machine readable instructions represented by the process of flowchart 300 of FIG. 3 may be implemented manually at the traffic management device 110 , for example, using a command line interface (CLI) prompt window operated by a system administrator.
  • CLI command line interface
  • the example algorithm is described with reference to flowchart 300 , persons of ordinary skill in the art will readily appreciate that many other methods of implementing the example machine readable instructions may alternatively be used.
  • the order of execution of the blocks in flowchart 300 may be changed, and/or some of the blocks described may be changed, eliminated, or combined.
  • flowchart 300 discusses a scenario where responses received from servers 102 ( 1 )- 102 (n) are not signed. It is to be noted servers 102 ( 1 )- 102 (n) may be able to sign some responses but are unable to sign some other responses, depending upon the request from client computers 104 ( 1 )- 104 (n).
  • traffic management device 110 receives a request from one of client computers 104 ( 1 )- 104 (n).
  • the request from the client computers 104 ( 1 )- 104 (n) can be a DNSSEC request for an address record (also referred to as an ‘A’ record) that requires a signed response, or an authenticated response from one or more servers 102 ( 1 )- 102 (n).
  • servers 102 ( 1 )- 102 (n) may not be able to provide an authenticated response to the request since the servers 102 ( 1 )- 102 (n) are in a conventional DNS only environment.
  • the request can include a URL for a website www.example.com, where “.” is the root, “.com” is a top-level domain, and “.example” is a second level domain, and so on, as can be understood by those of ordinary skill in the art.
  • top-level domains such as “.gov,” “.org,” “.net,” and/or country specific domains (e.g., “.us”) may be a part of the request from client computers 104 ( 1 )- 104 (n).
  • the request from one of the client computers 104 ( 1 )- 104 (n) can come via LDNS 106 , which may or may not have a cached copy of the requested resource for providing an initial response to the request. It is to be noted that the requests can be originating from anywhere around the earth, and are not geographically or otherwise restricted in their origin.
  • traffic management device 110 forwards the received request to one of the servers 102 ( 1 )- 102 (n) after removing bits and/or headers to convert the request into a regular DNS request that can be understood by servers 102 ( 1 )- 102 (n).
  • servers 102 ( 1 )- 102 (n) are not DNSSEC enabled, they are still on a trusted network (e.g., on LAN 114 ).
  • traffic management device 110 receives a response from one of servers 102 ( 1 )- 102 (n).
  • the response includes a resource record set (RRSET) including one or more address records.
  • the RRSET includes all the records of a given type for a given domain included in the original request, as known to those of ordinary skill in the art.
  • the response can be for the root “.”.
  • the response can be for the top level domain “.com” and/or second level domain “.example”.
  • the response can include a plurality of responses in succession starting from the root, which is the highest level, to the lowest level domain, and can therefore comprise building a chain of trust for signing response received from servers 102 ( 1 )- 102 (n).
  • each of the responses from servers 102 ( 1 )- 102 (n) for root, top level, and second level domains can be respectively analyzed for a signature, determined by the traffic management device 110 (e.g., in step 310 below).
  • the traffic management device 110 e.g., in step 310 below.
  • servers 102 ( 1 )- 102 (n) are regular DNS servers that are authoritative for the requested zone but do not have the capability to sign, the responses for root, top level, and second level domains will not be signed responses.
  • the response received from servers 102 ( 1 )- 102 (n) in this example will not be DNSSEC compliant.
  • a requested domain name e.g., www.example.com
  • a signature attached to it when received by the traffic management device 110 .
  • a previously authenticated response forwarded by the traffic management device 110 to the requesting one of client computers 104 ( 1 )- 104 (n) will no more have a valid signature, and will need to be signed again at the traffic management device 110 , as discussed below for step 318 .
  • traffic management device 110 determines whether the received response from one of the servers 102 ( 1 )- 102 (n) is a denial of existence response for the requested resource.
  • Denial of existence can occur, for example, when the original request from the client computers 104 ( 1 )- 104 (n) is for a non-existent domain name.
  • a denial of existence response may be received when one or more data records within a zone does not exist. For example, the name www.example.com may exist but an address record (or, ‘A’ record) at www.example.com may not exist and result in a denial of existence response from servers 102 ( 1 )- 102 (n).
  • traffic management device 110 determines the received response from one of the servers 102 ( 1 )- 102 (n) is a denial of existence response
  • traffic management device 110 creates one or more next secure (NSEC3) resource records belonging to a cryptographically hashed domain name. Since NSEC3 resource records are known to those of ordinary skill in the art, they will not be described in detail here.
  • traffic management device 110 dynamically manufactures the NSEC3 resource record based upon the request from the client, with no knowledge of the actual content of the relevant zone on domain name servers 102 ( 1 )- 102 (n), such that the manufactured NSEC3 resource record can be used by the client to prove non-existence of the requested name.
  • traffic management device 110 may dynamically manufacture the NSEC3 resource record based upon the request from the client with some knowledge of the actual content of the relevant zone on domain name servers 102 ( 1 )- 102 (n). In yet another example, traffic management device 110 may dynamically manufacture the NSEC3 resource record based upon the request from the client with complete knowledge of the actual content of the relevant zone on domain name servers 102 ( 1 )- 102 (n).
  • creating the NSEC3 resource record includes utilizing one of Secure Hash Algorithms (SHAs), although other types of hashing algorithms may be used.
  • SHAs Secure Hash Algorithms
  • resource records created by traffic management device 110 as a response to a denial of existence of original resource from servers 102 ( 1 )- 102 (n) are trusted by client computers 104 ( 1 )- 104 (n), since traffic management device 110 itself is a trusted device for client computers 104 ( 1 )- 104 (n). Signatures to the created zone are then attached by traffic management device 110 as described in step 318 below.
  • DNSSEC specified secure hashing algorithms e.g., SHA1
  • the requesting one of client computers 104 ( 1 )- 104 (n) may need a “spanning” NSEC3 record for its proof of non-existence (i.e., the closest enclose proof as disclosed in RFC 5155), or it may need a “matching” NSEC3 record (i.e., the exact enclose proof as also disclosed in RFC 5155).
  • a spanning record this example would take the hashed name “12345” and perform, for example, a “+1” or “ ⁇ 1” on the number the hash represents. Accordingly, in this case two numbers “12344” and “12346” are generated.
  • this example represents a method to manufacture an NSEC3 resource record at traffic management device 110 in substantially real-time upon receipt of the response in step 306 with no knowledge of the actual set of names in the zone.
  • traffic management device 110 may have some or complete knowledge of contents of the zone may use this example for generating NSEC3 records. Since spanning and matching records are known to those of ordinary skill in the art, and are disclosed in RFC 5155 hereby incorporated by reference in its entirety, the will not be described in detail herein.
  • step 310 traffic management device 110 determines if the response received from one of the servers 102 ( 1 )- 102 (n) was a DNSSEC response that included signatures for a top level domain, a second level domain, a sub-level domain, and/or all levels of the domain name. This determination can be made by the traffic management device 110 by checking whether or not the received response from servers 102 ( 1 )- 102 (n) includes a resource record signature (RRSIG), although other methods of determining may be used. Since RRSIG records that were introduced as a part of DNSSEC are known to those of ordinary skill in the art, they will not be described in detail here. If the received response includes an RRSIG, the flow proceeds to step 314 . If not, the traffic management device 110 determines the response is unauthenticated, and the flow proceeds to step 318 .
  • RRSIG resource record signature
  • traffic management device 110 dynamically in real-time generates one or more cryptographic signatures (e.g., RRSIG records) and attaches the signatures to the response received from one or more servers 102 ( 1 )- 102 (n). Attaching the signature can be performed in one or more of the following exemplary ways, although other ways of attaching signatures “on the fly” may be contemplated by those of ordinary skill in the art after reading this disclosure.
  • traffic management device 110 is configured to allocate zone signing keys (ZSKs) and Key Signing Keys (KSKs) for the received response from servers 102 ( 1 )- 102 (n).
  • ZSKs zone signing keys
  • KSKs Key Signing Keys
  • KSKs are used to sign other DNSKEY records
  • ZSKs are used to sign all resource record sets (RRSETs).
  • RRSETs resource record sets
  • both KSKs and ZSKs can be made stronger by using more bits in the key material, and for security reasons, can be rotated at different time intervals (e.g., KSK every 12 months and the ZSK every one to two months).
  • the public key infrastructure enables client computers 104 ( 1 )- 104 (n) to validate the integrity of the response received from non-DNSSEC servers 102 ( 1 )- 102 (n) signed with the private key.
  • cryptography module 208 supports FIPS storage of the private keys.
  • traffic management device 110 is configured to securely synchronize the keys between multiple FIPS devices, e.g., multiple traffic management devices.
  • cryptography module 208 includes a crypto-storage chip on the motherboard to secure a unique hardware key as part of the multi-layer encryption process employed by traffic management device 110 to secure KSKs and ZSKs.
  • KSKs and ZSKs may be secured, by way of example only and not by way of limitation, using secure SSL-encrypted storage systems. Accordingly, traffic management device 110 encrypts the response using the one or more keys, as discussed above.
  • traffic management device 110 forwards the response with the signature, along with a public key to the requesting one of the client computers 104 ( 1 )- 104 (n). Since traffic management device 110 signs the response from servers 102 ( 1 )- 102 (n) and client computers 104 ( 1 )- 104 (n) trust the traffic management device 110 , client computers 104 ( 1 )- 104 (n) can use the DNSKEY to validate the RRSET using RRSIG included in the forwarded response from traffic management device 110 . The flow ends in step 320 .
  • traffic management device 110 configured as a load balancing device can provide responses that can change depending on the requesting client out of client computers 104 ( 1 )- 104 (n).
  • traffic management device 110 may receive responses routed from a global load balancer connected to LAN 114 .
  • traffic management device 110 may receive two different responses—one from a server 102 ( 1 ) and another from a server 102 ( 2 ). Out of the two responses, it is possible that the response from server 102 ( 1 ) may be the only one that is signed and the response from server 102 ( 2 ) may not be signed.
  • the response from server 102 ( 2 ) might be the most current updated response with updated resource records.
  • traffic management device 110 will sign the response from server 102 ( 2 ) according to the steps of flowchart 300 , and forward the signed response to the client computers 104 ( 1 )- 104 (n), instead of sending the older signed response from server 102 ( 1 )- 102 (n).
  • Servers 102 ( 1 )- 102 (n) have DNS entries that are statically signed. Each time a DNS entry is updated, signatures associated with the DNS entries become outdated and those DNS entries have to be signed again either manually or offline. A change to a DNS entry means a change to an IP address that the DNS entry is translated into. Therefore, for updates to DNS entries, traffic management device 110 signs or authenticates the new responses including updated IP addresses, and performs load balancing based on the new signed IP addresses, while discarding the outdated or older IP addresses (and hence, older DNS entries).
  • examples of the technology described herein provide numerous advantages. For example, when client computers 104 ( 1 )- 104 (n) are in a DNSSEC environment requiring authenticated responses, examples disclosed herein enable such client computers 104 ( 1 )- 104 (n) to communicate with non-DNSSEC servers 102 ( 1 )- 102 (n) on a real time basis without any upgrades to software on client computers 104 ( 1 )- 104 (n).
  • Such dynamic “on-the-fly” authentication performed by traffic management device 110 when servers 102 ( 1 )- 102 (n) are unable to sign the responses ensure that the client computers 104 ( 1 )- 104 (n) receive valid resource records that are from a trusted source, and not from a rogue server or site.
  • the technology described also enables administrators of large non-DNSSEC DNS deployments to quickly become DNSSEC compliant by interposing traffic management device 110 according to the examples disclosed in such legacy deployments resulting in an easy and fast DNSSEC compliance solution.

Abstract

A method, computer readable medium, and device for providing authenticated domain name service includes forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device. The traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers. The traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.

Description

RELATED APPLICATIONS
This application is a continuation of U.S. patent application Ser. No. 12/836,053, filed Jul. 14, 2010, which is hereby incorporated by reference in its entirety.
TECHNOLOGICAL FIELD
This technology generally relates to securing network applications, and more particularly, to systems and methods for Domain Name System Security Extensions (DNSSEC) proxying and deployment amelioration.
BACKGROUND
Global Internet Domain Name System, also referred to as the Domain Name System (DNS), defines a tree of names starting with root, “.”, immediately below which are top level domain names such as “.com” and “.us”. Below top level domain names there are normally additional levels of names. Domain Name System (DNS) was invented as a technology for enabling humans to identify computers, services, and resources connected to a network (e.g., Internet) by corresponding names rather than network addresses (e.g., Internet Protocol (IP) addresses) in a number format. DNS translates human readable names into unique binary information of network devices to enable users to find the devices they need. Unfortunately, conventional DNS is not secure and is highly prone to malicious interception. The insecure nature of DNS has been known to cause substantial loss of privacy, data, and identity theft, among many other problems. For example, one of the ways in which DNS can be exploited is called DNS cache poisoning. When a client device inputs a Uniform Resource Locator (URL) into a client browser, a DNS resolver checks the Internet for the proper name/number translation and location. Typically, DNS will accept the first response or answer obtained without question and direct the client device to the site referred to in the response. The server receiving the DNS response will also cache that information for a period of time until it expires, so upon the next request for that name/number, the site is immediately delivered to the requesting client device. Since users at client devices assume they are getting the correct information, when a malicious system responds to the DNS query first with modified, false information, security of the client device is breached. Not only does that single computer get sent to the wrong place, but if the malicious server is answering for a service provider, then thousands of users can get sent to a rogue system. This misdirection of a URL request can last for hours to days, depending on how long the server stores the information, and all the other DNS servers that propagate the information can also be affected. The imminent dangers posed by a rogue site include delivering malware, committing fraud, and stealing personal or sensitive information.
To overcome some of the drawbacks of conventional DNS systems, Domain Name System Security Extensions (DNSSEC) were introduced as an attempt to add security to DNS while maintaining the backward compatibility needed to scale with the Internet as a whole. DNSSEC adds a digital signature to ensure the authenticity of certain types of DNS transactions and, therefore, the integrity of the information. DNSSEC is a series of DNS protocol extensions, described in Request for Comments (RFCs) 4033, 4034, and 4035, hereby incorporated by reference in their entireties, that ensures the integrity of data returned by domain name lookups by incorporating a chain of trust into the DNS hierarchy. The chain is built using public key infrastructure (PKI), with each link in the chain consisting of a public/private key pair. Deploying DNSSEC involves signing zones with public/private key encryption and returning DNS responses with signatures. A client's trust in the signatures is based on the chain of trust established across administrative boundaries, from parent to child zone, using a Domain Name System Key (DNSKEY) and delegation signer (DS) resource records, which were not defined in DNS specifications. In DNSSEC, since an unbroken chain of trust is established from the root at the top through the top-level domain (TLD) and down to individual registrants, the client device's answer always receives an authenticated response. All zones are authenticated by “signing,” in that a publisher of a zone signs that zone prior to publication, and the parent of that zone publishes the keys of that zone. With millions of zones, it is likely that the keys expire before the DNS records are updated. As a result, zone operators require techniques to automatically allocate keys to DNS records before these keys expire. Unfortunately, conventional systems are unable to handle management of keys for DNSSEC. Further, conventional DNS systems are unable to translate non-DNSSEC responses to DNSSEC responses.
Furthermore, conventional network systems are unable to handle DNSSEC signatures when zone names are dynamically updated. For example, consider a zone name that was previously signed statically. Subsequently, when the zone name is updated or changed, the DNSSEC signature for the earlier version of the zone is rendered invalid, and since the new zone is unsigned, there is no method for conventional systems to automatically enable DNSSEC for the dynamic update to the zone in real time.
In another related scenario, for global server load balancing (GSLB)-type DNS responses in which the Internet Protocol (IP) answer in a response to a request from a client device can change depending on the requesting client device, conventional systems are unable to provide DNSSEC for such dynamically changing domain names while at the same time performing global load balancing. Since GSLB can provide different answers to different clients for the same domain name, GSLB and DNSSEC are fundamentally at odds in the original design specifications. DNSSEC, as originally conceived, was focused solely on traditional static DNS and never considered the requirements of GSLB, or intelligent DNS. Unfortunately it is difficult for conventional systems to provide DNSSEC for dynamic DNS, and to provide DNSSEC for GSLB-type DNS responses in a load balancing scenario where there might be two different answers for the same request and the GSLB has to forward a signed response to the client device.
SUMMARY
One example of the technology is a method for providing authenticated domain name service. The method includes forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device. The traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers. The traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.
Another example includes a computer readable medium having stored thereon instructions for providing authenticated domain name service, which when executed by at least one processor, causes the processor to perform a number of steps. The steps include forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device. The traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers. The traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.
Another example is that of a traffic management device, which includes one or more processors executing one or more traffic management applications, a memory coupled to the one or more processors by a bus, a network interface controller coupled to the one or more processors and the memory and configured to receive data packets from a network that relate to the executing traffic management applications, and provide authenticated domain name service. In this example, at least one of the one or more processors is configured to execute programmed instructions stored in the memory and the network interface controller including logic capable of being further configured to implement forwarding at a traffic management device a request for a domain name from a client device to one or more servers coupled to the traffic management device. The traffic management device receives a first response comprising at least a portion of the domain name from the one or more servers. The traffic management device attaches a first signature to the first response when the first response is determined by the traffic management device to be an unauthenticated response, and provides the first response with the first signature to the client device.
The examples offer numerous advantages. By way of example only, technology disclosed enables signing DNS responses in real time and deploying DNSSEC quickly and easily in an existing network environment, thereby ensuring that answers to domain name requests received by the client devices when asking for name resolution come from a trusted name server, and not a hacker. The examples support Federal Information Processing Standard (FIPS) storage of the private keys, and are able to securely synchronize the keys between multiple FIPS devices. Additionally, examples of the disclosed technology use a cryptographic module or storage chip on a motherboard of a traffic management device to secure a unique hardware key as part of the multi-layer encryption process. When a response from a non-DNSSEC server is returned, the response is signed in real time to ensure continuous signing. The potential attacker cannot forge the signed response without the corresponding private key.
Further, the examples enable compliance with federal DNSSEC mandates and help protect valuable domain names and web properties from rogue servers sending invalid responses. Furthermore, the examples of the technology enable global server load balancing (GSLB)-type DNSSEC responses in which the IP answer can change depending on the requesting client by signing answers at the time the traffic management device (with load balancing functionality) decides what the answer to a request should be. These and other advantages, aspects, and features will become more apparent from the following detailed description when viewed in conjunction with the accompanying drawings. Non-limiting and non-exhaustive examples are described with reference to the following drawings. Accordingly, the drawings and descriptions below are to be regarded as illustrative in nature, and not as restrictive or limiting.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates an exemplary network system environment using traffic management device for DNSSEC proxying and deployment amelioration;
FIG. 2 is a partly schematic and partly functional block diagram of traffic management device in the exemplary network environment of FIG. 1; and
FIG. 3 is a flow chart of an exemplary process and method for DNSSEC proxying and deployment amelioration when a DNSSEC request is to be serviced using non-DNSSEC server devices.
DETAILED DESCRIPTION
Various examples of the technology disclosed enable a traffic management device 110 to handle mismatches between non-DNSSEC and DNSSEC environments. For example, client devices operating in a DNSSEC environment need to communicate with servers operating in a non-DNSSEC environment. Traffic management device 110 provides secure conversion from one environment to another and prevents malicious “man-in-the-middle” attacks.
Referring to FIG. 1, an exemplary network system 100 including traffic management device 110 that is configured to provide authenticated domain name service, for example, to requesting client computers 104(1) to 104(n) is illustrated. By way of example only, a network 112 can provide responses and requests according to the Hyper-Text Transfer Protocol (HTTP) based application, request for comments (RFC) document guidelines or the Common Internet File System (CIFS) or network file system (NFS) protocol in this example, although the principles discussed herein are not limited to these examples and can include other application protocols and other types of requests (e.g., File Transfer Protocol (FTP) based requests). The exemplary network system 100 can include a series of one or more client devices such as client computers 104(1) to 104(n). Client computers 104(1)-104(n) are coupled to traffic management device 110 via a local domain name server (LDNS) 106. In some examples, LDNS 106 is optional and client computers 104(1)-104(n) are coupled to traffic management device 110 directly or via a network 112. Traffic management device 110 is interposed in between servers 102(1) to 102(n) and the client devices 104(1) to 104(n) for providing one or more communication channels through network 112 and a Local Area Network (LAN) 114, although other communication channels may be directly established between various devices in network system 100 without network 112 and/or LAN 114. For clarity and brevity, in FIG. 1 two server devices 102(1) and 102(n) are shown, but it should be understood that any number of server devices can use the exemplary network system 100. Likewise, two client devices 104(1)-104(n), one LDNS 106, and one traffic management device 110 are shown in FIG. 1, but any number of client devices, LDNSs, and traffic management devices can also use the exemplary network system 100 as well. Although network 112 and LAN 114 are shown, other numbers and types of networks could be used. The ellipses and the designation “n” denote an unlimited number of server devices and client devices, respectively.
Servers 102(1)-102(n) comprise one or more server computing machines or devices capable of operating one or more Web-based applications that may be accessed by network devices in the network 112, such as client computers 104(1)-104(n) (also referred to as client devices 104(1)-104(n)), via traffic management device 110, and may provide other data representing requested resources, such as domain name services and zones, particular Web page(s) corresponding to URL request(s), image(s) of physical objects, and any other objects, responsive to the requests, although the servers 102(1)-102(n) may perform other tasks and provide other types of resources. It should be noted that while only two servers 102(1) and 102(n) are shown in the network system 100 depicted in FIG. 1, other numbers and types of servers may be coupled to the traffic management device 110. It is also contemplated that one or more of the servers 102(1)-102(n) may be a cluster of servers managed by a network traffic management device such as traffic management device 110. In one example, servers 102(1)-102(n) are DNS servers in a DNS environment. In another example, servers 102(1)-102(n) are DNSSEC servers in a DNSSEC environment. In yet another example, servers 102(1)-102(n) are a mix of DNS and DNSSEC servers, as can be understood by those of ordinary skill in the art upon reading this disclosure. In some examples, servers 102(1)-102(n) are Berkeley Internet Name Domain (BIND) servers.
The client computers 104(1)-104(n) in this example (also interchangeably referred to as client devices 104(1)-104(n), client computing devices 104(1)-104(n), clients 104(1)-104(n), and client computing systems 104(1)-104(n)) can run interface applications such as Web browsers that can provide an interface to make requests for and send data, including DNS and DNSSEC requests, to different Web server-based applications via LDNS 106 connected to the network 112 and/or via traffic management device 110. A series of network applications can run on the servers 102(1)-102(n) that allow the transmission of data that is requested by the client computers 104(1)-104(n). Servers 102(1)-102(n) can provide data or receive data in response to requests directed toward the respective applications on the servers 102(1)-102(n) from the client computers 104(1)-104(n). For example, as per the Transmission Control Protocol (TCP), packets can be sent to the servers 102(1)-102(n) from the requesting client computers 104(1)-104(n) to send data, although other protocols (e.g., FTP) may be used. It is to be understood that the servers 102(1)-102(n) can be hardware or software executing on and supported by hardware, or can represent a system with multiple servers, which can include internal or external networks. Servers 102(1)-102(n) can be domain name servers with DNS capabilities hosting one or more website zones. Alternatively, servers 102(1)-102(n) can be DNSSEC servers in a DNSSEC environment hosting one or more website zones. For example, the servers 102(1)-102(n) can be any BIND version of Microsoft Domain Controllers provided by Microsoft Corporation of Redmond, Wash., although other types of servers can be used. Further, additional servers can be coupled to the network 112 and/or LAN 114 and many different types of applications can be available on servers coupled to the network 112 and/or LAN 114.
Generally, the client devices such as the client computers 104(1)-104(n) can include virtually any computing device capable of connecting to another computing device to send and receive information, including Web-based information. The set of such devices can include devices that typically connect using a wired (and/or wireless) communications medium, such as personal computers (e.g., desktops, laptops), mobile and/or smart phones and the like. In this example, the client devices can run browsers and other types of applications (e.g., web-based applications) that can provide an interface to make one or more requests to different server-based applications via network 112, although requests for other types of network applications and resources, for example URLs, may be made by client computers 104(1)-104(n). Client computers 104(1)-104(n) can be configured to make DNSSEC and non-DNSSEC requests to servers 102(1)-102(n), or other types of traffic management devices (e.g., routers, load balancers, application delivery controllers, and the like).
Client computers 104(1)-104(n) can submit requests to LDNS 106. LDNS 106 can respond to the requests when resources are locally stored on LDNS 106, for example, in a local cache memory. For example, a client computer may request for a URL www.example.com. If LDNS 106 has a valid copy of www.example.com, it can directly provide this URL to the requesting client computer. In other scenarios, LDNS 106 forwards the requests to traffic management device 110 via network 112. LDNS 106 can be configured to expedite requests for network resources (e.g., URLs) based upon a history of requests from one or more client computers 104(1)-104(n). In one example, LDNS 106 can provide an initial response to a requesting one of client computers 104(1)-104(n) while additional resources are being fetched from severs 102(1)-102(n) resulting in a faster initial response for a request from client computers 104(1)-104(n). By way of example only, LDNS 106 can be a proxy server, or a server similar to servers 102(1)-102(n) but located between client computers 104(1)-104(n) and traffic management device 110.
A series of Web-based and/or other types of protected and unprotected network applications can run on servers 102(1)-102(n) that allow the transmission of data that is requested by the client computers 104(1)-104(n). The client computers 104(1)-104(n) can be further configured to engage in a secure communication directly with the traffic management device 110 and/or the servers 102(1)-102(n), via LDNS 106, or otherwise, using mechanisms such as Secure Sockets Layer (SSL), Internet Protocol Security (IPSec), Transport Layer Security (TLS), and the like.
In this example, network 112 comprises a publicly accessible network, such as the Internet, which includes client computers 104(1)-104(n), although network 112 may comprise other types of private and public networks that include other devices. Communications, such as requests from client computers 104(1)-104(n) and responses from servers 102(1)-102(n), take place over network 112 according to standard network protocols, such as the HTTP and TCP/IP protocols in this example, but the principles discussed herein are not limited to this example and can include other protocols (e.g., FTP). Further, network 112 can include local area networks (LANs), wide area networks (WANs), direct connections, other types and numbers of network types, and any combination thereof. On an interconnected set of LANs or other networks, including those based on different architectures and protocols, routers, switches, hubs, gateways, bridges, crossbars, and other intermediate network devices may act as links within and between LANs and other networks to enable messages and other data to be sent from and to network devices. Also, communication links within and between LANs and other networks typically include twisted wire pair (e.g., Ethernet), coaxial cable, analog telephone lines, full or fractional dedicated digital lines including T1, T2, T3, and T4, Integrated Services Digital Networks (ISDNs), Digital Subscriber Lines (DSLs), wireless links including satellite links, optical fibers, and other communications links known to those of ordinary skill in the relevant arts. Generally, network 112 includes any communication medium and method by which data may travel between client devices 104(1)-104(n), servers 102(1)-102(n), and traffic management device 110, and these devices are provided by way of example only.
In this example, each of the servers 102(1)-102(n), traffic management device 110, LDNS 106, and client computers 104(1)-104(n) can include a central processing unit (CPU), controller or processor, a memory, and an interface system which are coupled together by a bus or other link, although other numbers and types of each of the components and other configurations and locations for the components can be used. Since these devices are well known to those of ordinary skill in the relevant art(s), they will not be described in further detail herein.
In addition, two or more computing systems or devices can be substituted for any one of the systems in the network system 100. Accordingly, principles and advantages of cloud computing and/or distributed processing, such as redundancy, replication, virtualization, and the like, can also be implemented, as appropriate, to increase the robustness and performance of the devices and systems of the network system 100. The network system 100 can also be implemented on a computer system or systems that extend across any network environment using any suitable interface mechanisms and communications technologies including, for example telecommunications in any suitable form (e.g., voice, modem, and the like), Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs), the Internet, intranets, combination(s) thereof, and the like.
By way of example only and not by way of limitation, LAN 114 comprises a private local area network that includes the traffic management device 110 coupled to the one or more servers 102(1)-102(n), although the LAN 114 may comprise other types of private and public networks with other devices. Networks, including local area networks, besides being understood by those of ordinary skill in the relevant art(s), have already been described above in connection with network 112, and thus will not be described further here.
As shown in the example environment of network system 100 depicted in FIG. 1, the traffic management device 110 can be interposed between the network 112 and the servers 102(1)-102(n) coupled via LAN 114 as shown in FIG. 1. Again, the network system 100 could be arranged in other manners with other numbers and types of devices. Also, the traffic management device 110 is coupled to network 112 by one or more network communication links, and intermediate network devices, such as routers, switches, gateways, hubs, crossbars, and other devices. It should be understood that the devices and the particular configuration shown in FIG. 1 are provided for exemplary purposes only and thus are not limiting. Although a single traffic management device 110, additional traffic management devices may be coupled in series and/or parallel to the traffic management device 110, thereby forming a cluster, depending upon specific applications, and the single traffic management device 110 shown in FIG. 1 is by way of example only, and not by way of limitation.
Generally, the traffic management device 110 manages network communications, which may include one or more client requests and server responses, to/from the network 112 between the client computers 104(1)-104(n) and one or more of the servers 102(1)-102(n) in LAN 114 in these examples. These requests may be destined for one or more servers 102(1)-102(n), and, as alluded to earlier, may take the form of one or more TCP/IP data packets originating from the network 112, passing through one or more intermediate network devices and/or intermediate networks, until ultimately reaching the traffic management device 110, for example.
In one example, traffic management device 110 is configured as a global server load balancing device that distributes end-user application requests based on business policies, data center conditions, network conditions, user location, and application performance, such that each request from client computers 104(1)-104(n) is automatically directed to the closest or best-performing data center hosting one or more servers 102(1)-102(n). In this example, traffic management device 110 provides DNSSEC signed responses even when zone names have been dynamically updated. Although in this example, traffic management device 110 has global server load balancing capabilities, in alternative examples traffic management device 110 may receive responses from a global server load balancing (GSLB) device coupled to LAN 114. By way of example only, such a global load balancing device can be a BIG-IP® Global Traffic Manager™ provided by F5 Networks, Inc., of Seattle, Wash.
In addition, as discussed in more detail with reference to FIGS. 2-3, traffic management device 110 is configured to provide authenticated domain name service. In any case, the traffic management device 110 may manage the network communications by performing several network traffic management related functions involving network communications, secured or unsecured, such as load balancing, access control, VPN hosting, network traffic acceleration, encryption, decryption, cookie, and key management and providing authenticated domain name service in accordance with the systems and processes described further below in connection with FIGS. 2-3, for example.
Referring to FIG. 2, an exemplary traffic management device 110 is illustrated. Included within the traffic management device 110 is a system bus 26 (also referred to as bus 26) that communicates with a host system 18 via a bridge 25 and with an input-output (I/O) device 30. In this example, a single I/O device 30 is shown to represent any number of I/O devices connected to bus 26. In one example, bridge 25 is in further communication with a host processor 20 via host input output (I/O) ports 29. Host processor 20 can further communicate with a network interface controller 24 via a CPU bus 202, a host memory 22 (via a memory port 53), and a cache memory 21. As outlined above, included within the host processor 20 are host I/O ports 29, memory port 53, and a main processor (not shown separately). In this example, host system 18 includes a cryptography module 208.
In one example, traffic management device 110 can include the host processor 20 characterized by anyone of the following component configurations: computer readable medium and logic circuits that respond to and process instructions fetched from the host memory 22; a microprocessor unit, such as: those manufactured by Intel Corporation of Santa Clara, Calif.; those manufactured by Motorola Corporation of Schaumburg, Ill.; those manufactured by Transmeta Corporation of Santa Clara, Calif.; the RS/6000 processor such as those manufactured by International Business Machines of Armonk, N.Y.; a processor such as those manufactured by Advanced Micro Devices of Sunnyvale, Calif.; or any other combination of logic circuits capable of executing the systems and methods described herein. Still other examples of the host processor 20 can include any combination of the following: a microprocessor, a microcontroller, a central processing unit with a single processing core, a central processing unit with two processing cores, or a central processing unit with more than one processing core.
Examples of the traffic management device 110 include one or more application delivery controller devices of the BIG-IP® product family provided by F5 Networks, Inc. of Seattle, Wash., although other types of traffic management devices may be used. In an exemplary structure and/or arrangement, traffic management device 110 can include the host processor 20 that communicates with cache memory 21 via a secondary bus also known as a backside bus, while another example of the traffic management device 110 includes the host processor 20 that communicates with cache memory 21 via the system bus 26. The local system bus 26 can, in some examples, also be used by the host processor 20 to communicate with more than one type of I/O devices 30. In some examples, the local system bus 26 can be anyone of the following types of buses: a VESA VL bus; an ISA bus; an EISA bus; a Micro Channel Architecture (MCA) bus; a PCI bus; a PCI-X bus; a PCI-Express bus; or a NuBus. Other example configurations of the traffic management device 110 include I/O device 30 that is a video display (not shown separately) that communicates with the host processor 20 via an Advanced Graphics Port (AGP). Still other versions of the traffic management device 110 include host processor 20 connected to I/O device 30 via any one or more of the following connections: HyperTransport, Rapid I/O, or InfiniBand. Further examples of the traffic management device 110 include a communication connection where the host processor 20 communicates with one I/O device 30 using a local interconnect bus and with a second I/O device (not shown separately) using a direct connection. As described above, included within some examples of the traffic management device 110 is each of host memory 22 and cache memory 21. The cache memory 21, will, in some examples, be any one of the following types of memory: SRAM; BSRAM; or EDRAM. Other examples include cache memory 21 and host memory 22 that can be anyone of the following types of memory: Static random access memory (SRAM), Burst SRAM or SynchBurst SRAM (BSRAM), Dynamic random access memory (DRAM), Fast Page Mode DRAM (FPM DRAM), Enhanced DRAM (EDRAM), Extended Data Output RAM (EDO RAM), Extended Data Output DRAM (EDO DRAM), Burst Extended Data Output DRAM (BEDO DRAM), Enhanced DRAM (EDRAM), synchronous DRAM (SDRAM), JEDECSRAM, PCIOO SDRAM, Double Data Rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), SyncLink DRAM (SLDRAM), Direct Rambus DRAM (DRDRAM), Ferroelectric RAM (FRAM), or any other type of memory device capable of executing the systems and methods described herein.
The host memory 22 and/or the cache memory 21 can, in some examples, include one or more memory devices capable of storing data and allowing any storage location to be directly accessed by the host processor 20. Such storage of data can be in a local database internal to traffic management device 110, or external to traffic management device 110 coupled via one or more input output ports of network interface controller 24. Further examples of traffic management device 110 include a host processor 20 that can access the host memory 22 via one of either: system bus 26; memory port 53; or any other connection, bus or port that allows the host processor 20 to access host memory 22.
One example of the traffic management device 110 provides support for anyone of the following installation devices: a floppy disk drive for receiving floppy disks such as 3.5-inch, 5.25-inch disks or ZIP disks, a CD-ROM drive, a CD-R/RW drive, a DVD-ROM drive, tape drives of various formats, USB device, a bootable medium, a bootable CD, a bootable compact disk (CD) for GNU/Linux distribution such as KNOPPIX®, a hard-drive or any other device suitable for installing applications or software. Applications can, in some examples, include a client agent, or any portion of a client agent. The traffic management device 110 may further include a storage device (not shown separately) that can be either one or more hard disk drives, or one or more redundant arrays of independent disks; where the storage device is configured to store an operating system, software, programs applications, or at least a portion of the client agent. A further example of the traffic management device 110 includes an installation device that is used as the storage device.
Furthermore, the traffic management device 110 can include network interface controller 24 to communicate, via an input-output port inside network interface controller 24, with a Local Area Network (LAN), Wide Area Network (WAN) or the Internet through a variety of connections including, but not limited to, standard telephone lines, LAN or WAN links (e.g., 802.11, T1, T3, 56 kb, X.25, SNA, DECNET), broadband connections (e.g., ISDN, Frame Relay, ATM, Gigabit Ethernet, Ethernet-over-SONET), wireless connections, optical connections, or some combination of any or all of the above. Connections can also be established using a variety of communication protocols (e.g., TCP/IP, IPX, SPX, NetBIOS, Ethernet, ARCNET, SONET, SDH, Fiber Distributed Data Interface (FDDI), RS232, RS485, IEEE 802.11, IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, CDMA, GSM, WiMax and direct asynchronous connections). One version of the traffic management device 110 includes network interface controller 24 configured to communicate with additional computing devices via any type and/or form of gateway or tunneling protocol such as Secure Socket Layer (SSL) or Transport Layer Security (TLS), or the Citrix Gateway Protocol manufactured by Citrix Systems, Inc. of Fort Lauderdale, Fla. Versions of the network interface controller 24 can comprise anyone of: a built-in network adapter; a network interface card; a PCMCIA network card; a card bus network adapter; a wireless network adapter; a USB network adapter; a modem; or any other device suitable for interfacing the traffic management device 110 to a network capable of communicating and performing the methods and systems described herein.
In various examples, the traffic management device 110 can include any one of the following I/O devices 30: a keyboard; a pointing device; a mouse; a gesture based remote control device; a biometric device; an audio device; track pads; an optical pen; trackballs; microphones; drawing tablets; video displays; speakers; inkjet printers; laser printers; and dye sublimation printers; or any other input/output device able to perform the methods and systems described herein. Host I/O ports 29 may in some examples connect to multiple I/O devices 30 to control the one or more I/O devices 30. Some examples of the I/O devices 30 may be configured to provide storage or an installation medium, while others may provide a universal serial bus (USB) interface for receiving USB storage devices such as the USB Flash Drive line of devices manufactured by Twintech Industry, Inc. Still other examples of an I/O device 30 may be bridge 25 between the system bus 26 and an external communication bus, such as: a USB bus; an Apple Desktop Bus; an RS-232 serial connection; a SCSI bus; a FireWire bus; a FireWire 800 bus; an Ethernet bus; an AppleTalk bus; a Gigabit Ethernet bus; an Asynchronous Transfer Mode bus; a HIPPI bus; a Super HIPPI bus; a SerialPlus bus; a SCI/LAMP bus; a FibreChannel bus; or a Serial Attached small computer system interface bus.
According to some examples, traffic management device 110 includes cryptography module 208 integrated as part of host system 18 for carrying out various exemplary functions of storing private and public keys. Alternatively, cryptography module 208 may be a part of an autonomous application security manager module integrated with or communicating independently with the traffic management device 110. An exemplary application security manager is the BIG-IP® Application Security Manager™ provided by F5 Networks, Inc. of Seattle, Wash. In one example, cryptography module 208 includes a crypto-storage chip on the motherboard to secure one or more unique hardware keys as part of the multi-layer encryption process employed by traffic management device 110 to secure keys.
Accordingly, components of traffic management device 110 include one or more processors (e.g., host processor 20) executing one or more traffic management applications, memory (e.g., cache memory 21, and/or host memory 22) coupled to the one or more processors by a bus, network interface controller 24 coupled to the one or more processors and the host memory 22 and configured to receive data packets from a network that relate to the executing traffic management applications, and provide authenticated domain name service. In this example, at least one of the one or more processors is configured to execute programmed instructions stored in the memory (e.g., cache memory 21, and/or host memory 22) and the network interface controller 24 including logic capable of being further configured to implement forwarding at traffic management device 110 a request for a domain name from a client device (e.g., one or more of client computers 104(1)-104(n)) to one or more servers (e.g., servers 102(1)-102(n)) coupled to traffic management device 110. The traffic management device 110 receives a first response comprising at least a portion of the domain name from the one or more servers 102(1)-102(n). The traffic management device 110 attaches a first signature to the first response when the first response is determined by the traffic management device 110 to be an unauthenticated response, and provides the first response with the first signature to the client device (e.g., one or more of client computers 104(1)-104(n)).
The operation of example processes for providing authenticated domain name service using traffic management device 110 shown in FIGS. 1-2, will now be described with reference back to FIGS. 1-2 in conjunction with flow diagram or flowchart 300 shown in FIG. 3, respectively. The flowchart 300 is representative of example machine readable instructions for implementing in dynamic real-time authenticated domain name service, for example, at the traffic management device 110. In this example, the machine readable instructions comprise an algorithm for execution by: (a) a processor (e.g., host processor 20), (b) a controller, and/or (c) one or more other suitable processing device(s) within host system 18, for example. The algorithm may be implemented in software stored on tangible computer readable media such as, for example, a flash memory, a CD-ROM, a floppy disk, a hard drive, a digital video (versatile) disk (DVD), or other memory devices, but persons of ordinary skill in the art will readily appreciate that the entire algorithm and/or parts thereof could alternatively be executed by a device other than a processor and/or implemented in firmware or dedicated hardware in a well known manner (e.g., it may be implemented by an application specific integrated circuit (ASIC), a programmable logic device (PLD), a field programmable logic device (FPLD), a field programmable gate array (FPGA), discrete logic, or the like). For example, at least some of the components of the traffic management device 110 could be implemented by software, hardware, and/or firmware. Also, some or all of the machine readable instructions represented by the process of flowchart 300 of FIG. 3 may be implemented manually at the traffic management device 110, for example, using a command line interface (CLI) prompt window operated by a system administrator. Further, although the example algorithm is described with reference to flowchart 300, persons of ordinary skill in the art will readily appreciate that many other methods of implementing the example machine readable instructions may alternatively be used. For example, the order of execution of the blocks in flowchart 300 may be changed, and/or some of the blocks described may be changed, eliminated, or combined.
Referring now to FIG. 3, flowchart 300 discusses a scenario where responses received from servers 102(1)-102(n) are not signed. It is to be noted servers 102(1)-102(n) may be able to sign some responses but are unable to sign some other responses, depending upon the request from client computers 104(1)-104(n).
In step 302 of the flowchart 300, traffic management device 110 receives a request from one of client computers 104(1)-104(n). In this example, the request from the client computers 104(1)-104(n) can be a DNSSEC request for an address record (also referred to as an ‘A’ record) that requires a signed response, or an authenticated response from one or more servers 102(1)-102(n). In this example, servers 102(1)-102(n) may not be able to provide an authenticated response to the request since the servers 102(1)-102(n) are in a conventional DNS only environment. By way of example only, the request can include a URL for a website www.example.com, where “.” is the root, “.com” is a top-level domain, and “.example” is a second level domain, and so on, as can be understood by those of ordinary skill in the art. Further by way of example only and not by way of limitation, other types of top-level domains such as “.gov,” “.org,” “.net,” and/or country specific domains (e.g., “.us”) may be a part of the request from client computers 104(1)-104(n). The request from one of the client computers 104(1)-104(n) can come via LDNS 106, which may or may not have a cached copy of the requested resource for providing an initial response to the request. It is to be noted that the requests can be originating from anywhere around the earth, and are not geographically or otherwise restricted in their origin.
In step 304, traffic management device 110 forwards the received request to one of the servers 102(1)-102(n) after removing bits and/or headers to convert the request into a regular DNS request that can be understood by servers 102(1)-102(n). Although in this example servers 102(1)-102(n) are not DNSSEC enabled, they are still on a trusted network (e.g., on LAN 114).
In step 306, traffic management device 110 receives a response from one of servers 102(1)-102(n). In one example, the response includes a resource record set (RRSET) including one or more address records. The RRSET includes all the records of a given type for a given domain included in the original request, as known to those of ordinary skill in the art. In this example, the response can be for the root “.”. Alternatively, the response can be for the top level domain “.com” and/or second level domain “.example”. The response can include a plurality of responses in succession starting from the root, which is the highest level, to the lowest level domain, and can therefore comprise building a chain of trust for signing response received from servers 102(1)-102(n). For example, each of the responses from servers 102(1)-102(n) for root, top level, and second level domains, can be respectively analyzed for a signature, determined by the traffic management device 110 (e.g., in step 310 below). In the example of FIG. 3, since servers 102(1)-102(n) are regular DNS servers that are authoritative for the requested zone but do not have the capability to sign, the responses for root, top level, and second level domains will not be signed responses. As a result, the response received from servers 102(1)-102(n) in this example will not be DNSSEC compliant. For example, in one scenario a requested domain name, e.g., www.example.com, will not have a signature attached to it when received by the traffic management device 110. In another scenario, there will be dynamic updates to www.example.com records. In this scenario, a previously authenticated response forwarded by the traffic management device 110 to the requesting one of client computers 104(1)-104(n) will no more have a valid signature, and will need to be signed again at the traffic management device 110, as discussed below for step 318.
In step 308, traffic management device 110 determines whether the received response from one of the servers 102(1)-102(n) is a denial of existence response for the requested resource. Denial of existence can occur, for example, when the original request from the client computers 104(1)-104(n) is for a non-existent domain name. Alternatively, a denial of existence response may be received when one or more data records within a zone does not exist. For example, the name www.example.com may exist but an address record (or, ‘A’ record) at www.example.com may not exist and result in a denial of existence response from servers 102(1)-102(n). Since A records are well known to those of ordinary skill in the art, they will not be described in detail here. If the received response from one of the servers 102(1)-102(n) is a denial of existence, the flow proceeds to step 316, and if not, the flow proceeds to step 310.
In step 316, when the traffic management device 110 determines the received response from one of the servers 102(1)-102(n) is a denial of existence response, traffic management device 110 creates one or more next secure (NSEC3) resource records belonging to a cryptographically hashed domain name. Since NSEC3 resource records are known to those of ordinary skill in the art, they will not be described in detail here. In one example, traffic management device 110 dynamically manufactures the NSEC3 resource record based upon the request from the client, with no knowledge of the actual content of the relevant zone on domain name servers 102(1)-102(n), such that the manufactured NSEC3 resource record can be used by the client to prove non-existence of the requested name. In another example, traffic management device 110 may dynamically manufacture the NSEC3 resource record based upon the request from the client with some knowledge of the actual content of the relevant zone on domain name servers 102(1)-102(n). In yet another example, traffic management device 110 may dynamically manufacture the NSEC3 resource record based upon the request from the client with complete knowledge of the actual content of the relevant zone on domain name servers 102(1)-102(n). By way of example only, creating the NSEC3 resource record includes utilizing one of Secure Hash Algorithms (SHAs), although other types of hashing algorithms may be used. In this example, resource records created by traffic management device 110 as a response to a denial of existence of original resource from servers 102(1)-102(n) are trusted by client computers 104(1)-104(n), since traffic management device 110 itself is a trusted device for client computers 104(1)-104(n). Signatures to the created zone are then attached by traffic management device 110 as described in step 318 below.
One example of how the NSEC3 resource record is created by traffic management device 110 is by taking the requested non-existent name, say www.example.com and performing hashing using one of the DNSSEC specified secure hashing algorithms (e.g., SHA1) prior to sending the response to the requesting one of the client computers 104(1)-104(n). Assuming, by way of example only and not by way of limitation, the resulting hash is equal to “12345”. The requesting one of client computers 104(1)-104(n) may need a “spanning” NSEC3 record for its proof of non-existence (i.e., the closest enclose proof as disclosed in RFC 5155), or it may need a “matching” NSEC3 record (i.e., the exact enclose proof as also disclosed in RFC 5155). For a spanning record, this example would take the hashed name “12345” and perform, for example, a “+1” or “−1” on the number the hash represents. Accordingly, in this case two numbers “12344” and “12346” are generated. These new hash values would span the original hashed non-existent name and would be used to create a spanning NSEC3 record at traffic management device 110. Similarly, for a matching record, two hash values are required, however, only the “+1” is created and paired with the original name by traffic management device 110, resulting in an NSEC3 record containing “12345” and “12346”. It is to be noted that although in the examples above “+/−1” values were used, any increment method, for example “+/−N” where N is an integer, may be used and the “+/−1” is only an illustrative example and is not limiting. Additionally, this example represents a method to manufacture an NSEC3 resource record at traffic management device 110 in substantially real-time upon receipt of the response in step 306 with no knowledge of the actual set of names in the zone. As discussed above, additional scenarios where traffic management device 110 may have some or complete knowledge of contents of the zone may use this example for generating NSEC3 records. Since spanning and matching records are known to those of ordinary skill in the art, and are disclosed in RFC 5155 hereby incorporated by reference in its entirety, the will not be described in detail herein.
In step 310, traffic management device 110 determines if the response received from one of the servers 102(1)-102(n) was a DNSSEC response that included signatures for a top level domain, a second level domain, a sub-level domain, and/or all levels of the domain name. This determination can be made by the traffic management device 110 by checking whether or not the received response from servers 102(1)-102(n) includes a resource record signature (RRSIG), although other methods of determining may be used. Since RRSIG records that were introduced as a part of DNSSEC are known to those of ordinary skill in the art, they will not be described in detail here. If the received response includes an RRSIG, the flow proceeds to step 314. If not, the traffic management device 110 determines the response is unauthenticated, and the flow proceeds to step 318.
In step 318, traffic management device 110 dynamically in real-time generates one or more cryptographic signatures (e.g., RRSIG records) and attaches the signatures to the response received from one or more servers 102(1)-102(n). Attaching the signature can be performed in one or more of the following exemplary ways, although other ways of attaching signatures “on the fly” may be contemplated by those of ordinary skill in the art after reading this disclosure. For attaching a signature, traffic management device 110 is configured to allocate zone signing keys (ZSKs) and Key Signing Keys (KSKs) for the received response from servers 102(1)-102(n). In this example, KSKs are used to sign other DNSKEY records, while ZSKs are used to sign all resource record sets (RRSETs). By way of example only, both KSKs and ZSKs can be made stronger by using more bits in the key material, and for security reasons, can be rotated at different time intervals (e.g., KSK every 12 months and the ZSK every one to two months). The public key infrastructure enables client computers 104(1)-104(n) to validate the integrity of the response received from non-DNSSEC servers 102(1)-102(n) signed with the private key. Since the private key of the public/private key pair could be used to impersonate a valid signer, those keys are kept secure, by way of example only, by storing them as hardware keys in cryptography module 208. By way of example only, cryptography module 208 supports FIPS storage of the private keys. Additionally, traffic management device 110 is configured to securely synchronize the keys between multiple FIPS devices, e.g., multiple traffic management devices. In one example, cryptography module 208 includes a crypto-storage chip on the motherboard to secure a unique hardware key as part of the multi-layer encryption process employed by traffic management device 110 to secure KSKs and ZSKs. Alternatively, KSKs and ZSKs may be secured, by way of example only and not by way of limitation, using secure SSL-encrypted storage systems. Accordingly, traffic management device 110 encrypts the response using the one or more keys, as discussed above.
In step 312, traffic management device 110 forwards the response with the signature, along with a public key to the requesting one of the client computers 104(1)-104(n). Since traffic management device 110 signs the response from servers 102(1)-102(n) and client computers 104(1)-104(n) trust the traffic management device 110, client computers 104(1)-104(n) can use the DNSKEY to validate the RRSET using RRSIG included in the forwarded response from traffic management device 110. The flow ends in step 320.
Example Use Case
In one exemplary global server load balancing (GSLB)-type scenario, traffic management device 110 configured as a load balancing device can provide responses that can change depending on the requesting client out of client computers 104(1)-104(n). Alternatively, traffic management device 110 may receive responses routed from a global load balancer connected to LAN 114. For example, for a request www.example.com, traffic management device 110 may receive two different responses—one from a server 102(1) and another from a server 102(2). Out of the two responses, it is possible that the response from server 102(1) may be the only one that is signed and the response from server 102(2) may not be signed. However, the response from server 102(2) might be the most current updated response with updated resource records. In such a scenario, traffic management device 110 will sign the response from server 102(2) according to the steps of flowchart 300, and forward the signed response to the client computers 104(1)-104(n), instead of sending the older signed response from server 102(1)-102(n).
Servers 102(1)-102(n) have DNS entries that are statically signed. Each time a DNS entry is updated, signatures associated with the DNS entries become outdated and those DNS entries have to be signed again either manually or offline. A change to a DNS entry means a change to an IP address that the DNS entry is translated into. Therefore, for updates to DNS entries, traffic management device 110 signs or authenticates the new responses including updated IP addresses, and performs load balancing based on the new signed IP addresses, while discarding the outdated or older IP addresses (and hence, older DNS entries).
The examples of the technology described herein provide numerous advantages. For example, when client computers 104(1)-104(n) are in a DNSSEC environment requiring authenticated responses, examples disclosed herein enable such client computers 104(1)-104(n) to communicate with non-DNSSEC servers 102(1)-102(n) on a real time basis without any upgrades to software on client computers 104(1)-104(n). Such dynamic “on-the-fly” authentication performed by traffic management device 110 when servers 102(1)-102(n) are unable to sign the responses, ensure that the client computers 104(1)-104(n) receive valid resource records that are from a trusted source, and not from a rogue server or site. The technology described also enables administrators of large non-DNSSEC DNS deployments to quickly become DNSSEC compliant by interposing traffic management device 110 according to the examples disclosed in such legacy deployments resulting in an easy and fast DNSSEC compliance solution.
Having thus described the basic concepts, it will be rather apparent to those skilled in the art that the foregoing detailed disclosure is intended to be presented by way of example only and is not limiting. Various alterations, improvements, and modifications will occur and are intended to those skilled in the art, though not expressly stated herein. The order that the measures and processes for providing secure application delivery are implemented can also be altered. Furthermore, multiple networks in addition to network 112 and LAN 114 could be associated with traffic management device 110 from/to which network packets can be received/transmitted, respectively. These alterations, improvements, and modifications are intended to be suggested by this disclosure, and are within the spirit and scope of the examples. Additionally, the recited order of processing elements or sequences, or the use of numbers, letters, or other designations therefore, is not intended to limit the claimed processes and methods to any order except as can be specified in the claims.

Claims (36)

What is claimed is:
1. A method for providing authenticated domain name service comprising:
forwarding at a traffic management device a domain name system security extension (DNSSEC) type request for a domain name received from a client device to one or more domain name system (DNS) servers;
receiving at the traffic management device a response for at least a portion of the domain name from the one or more servers, wherein the one or more servers are not domain name system security extension (DNSSEC) compliant;
creating at the traffic management device a resource record when the response is determined to be a denial of existence response for the requested domain name;
generating at the traffic management device a signature and signing the response or the resource record using the signature; and
sending at the traffic management device the signed resource record or response to the client device in response to the request.
2. The method as set forth in claim 1, wherein the one or more servers are authoritative for a zone associated with the at least a portion of the domain name.
3. The method as set forth in claim 1, wherein the signing further comprises encrypting the response or the resource record using a stored private key, the method further comprising performing at the traffic management device a hash of the encrypted response or resource record prior to the sending.
4. The method as set forth in claim 1, wherein the at least a portion of the domain name comprises a top-level domain name that is known to be authenticated.
5. The method as set forth in claim 1, wherein at least one of the first or second server is authoritative for a zone associated with the at least a portion of the domain name.
6. A non-transitory computer readable medium having stored thereon instructions for providing authenticated domain name service comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
forwarding a domain name system security extension (DNSSEC) type request for a domain name received from a client device to one or more domain name system (DNS) servers;
receiving a response for at least a portion of the domain name from the one or more servers, wherein the one or more servers are not domain name system security extension (DNSSEC) compliant;
creating a resource record when the response is determined to be a denial of existence response for the requested domain name;
generating a signature and signing the response or the resource record using the signature; and
sending the signed resource record or response to the client device in response to the request.
7. The medium as set forth in claim 6, wherein the one or more servers are authoritative for a zone associated with the at least a portion of the domain name.
8. The medium as set forth in claim 6, wherein the signing further comprises encrypting the response or the resource record using a stored private key, the medium further having stored thereon instructions comprising machine executable code which when executed by the at least one processor causes the processor to perform steps further comprising performing a hash of the encrypted response or resource record prior to the sending.
9. The medium as set forth in claim 6, wherein the at least a portion of the domain name comprises a top-level domain name that is known to be authenticated.
10. A traffic management device comprising:
at least one processor; and
a memory coupled to the at least one processor which is configured to be capable of executing programmed instructions stored in the memory to perform steps comprising:
forwarding a domain name system security extension (DNSSEC) type request for a domain name received from a client device to one or more domain name system (DNS) servers;
receiving a response for at least a portion of the domain name from the one or more servers, wherein the one or more servers are not domain name system security extension (DNSSEC) compliant;
creating a resource record when the response is determined to be a denial of existence response for the requested domain name;
generating a signature and signing the response or the resource record using the signature; and
sending the signed resource record or response to the client device in response to the request.
11. The device as set forth in claim 10, wherein the one or more servers are authoritative for a zone associated with the at least a portion of the domain name.
12. The device as set forth in claim 10, wherein the signing further comprises encrypting the response or the resource record using a stored private key, the at least one processor further configured to be capable of executing programmed instructions stored in the memory to perform steps further comprising performing a hash of the encrypted first response or resource record prior to the sending.
13. The device as set forth in claim 10, wherein the at least a portion of the domain name comprises a top-level domain name that is known to be authenticated.
14. A method for providing authenticated domain name service comprising:
forwarding at a traffic management device a domain name system security extension (DNSSEC) type request for a domain name received from a client device to a global server load balancer coupled to at least first domain name system (DNS) server that is not DNSSEC compliant and a second DNS server that is DNSSEC compliant;
receiving at the traffic management device first and second responses for at least a portion of the domain name from the global server load balancer, wherein the first response is from the first server and the second response is from the second server;
generating at the traffic management device a signature and signing the first response using the signature when the first response is determined to be more current than the second response; and
sending at the traffic management device the signed first response to the client device in response to the request.
15. The method as set forth in claim 1, wherein the first and second responses are denial of existence responses and the method further comprises:
creating at the traffic management device a resource record;
generating at the traffic management device a signature and signing the first or second response or the resource record using the signature; and
sending at the traffic management device the signed resource record or first or second response to the client device in response to the request.
16. The method as set forth in claim 15, wherein the signing further comprises encrypting the first or second response or the resource record using a stored private key, the method further comprising performing at the traffic management device a hash of the encrypted first or second response or resource record prior to the sending.
17. A non-transitory computer readable medium having stored thereon instructions for providing authenticated domain name service comprising machine executable code which when executed by at least one processor, causes the processor to perform steps comprising:
forwarding a domain name system security extension (DNSSEC) type request for a domain name received from a client device to a global server load balancer coupled to at least first domain name system (DNS) server that is not DNSSEC compliant and a second DNS server that is DNSSEC compliant;
receiving first and second responses for at least a portion of the domain name from the global server load balancer, wherein the first response is from the first server and the second response is from the second server;
generating a signature and signing the first response using the signature when the first response is determined to be more current than the second response; and
sending the signed first response to the client device in response to the request.
18. The medium as set forth in claim 17, wherein the first and second responses are denial of existence responses and the medium further has stored thereon instructions comprising machine executable code which when executed by the at least one processor causes the processor to perform steps further comprising:
creating at the traffic management device a resource record;
generating at the traffic management device a signature and signing the first or second response or the resource record using the signature; and
sending at the traffic management device the signed resource record or first or second response to the client device in response to the request.
19. The medium as set forth in claim 18, wherein the signing further comprises encrypting the first or second response or the resource record using a stored private key, the medium further having stored thereon instructions comprising machine executable code which when executed by the at least one processor causes the processor to perform steps further comprising performing a hash of the encrypted first or second response or resource record prior to the sending.
20. The medium as set forth in claim 17, wherein at least one of the first or second server is authoritative for a zone associated with the at least a portion of the domain name.
21. A traffic management device comprising:
at least one processor; and
a memory coupled to the at least one processor which is configured to be capable of executing programmed instructions stored in the memory to perform steps comprising:
forwarding a domain name system security extension (DNSSEC) type request for a domain name received from a client device to a global server load balancer coupled to at least first domain name system (DNS) server that is not DNSSEC compliant and a second DNS server that is DNSSEC compliant;
receiving first and second responses for at least a portion of the domain name from the global server load balancer, wherein the first response is from the first server and the second response is from the second server;
generating a signature and signing the first response using the signature when the first response is determined to be more current than the second response; and
sending the signed first response to the client device in response to the request.
22. The device as set forth in claim 21, wherein the first and second responses are denial of existence responses and the at least one processor is further configured to be capable of executing programmed instructions stored in the memory to perform steps further comprising:
creating at the traffic management device a resource record;
generating at the traffic management device a signature and signing the first or second response or the resource record using the signature; and
sending at the traffic management device the signed resource record or first or second response to the client device in response to the request.
23. The device as set forth in claim 22, wherein the signing further comprises encrypting the first or second response or the resource record using a stored private key, the at least one processor further configured to be capable of executing programmed instructions stored in the memory to perform steps further comprising performing a hash of the encrypted first or second response or resource record prior to the sending.
24. The device as set forth in claim 21, wherein at least one of the first or second server is authoritative for a zone associated with the at least a portion of the domain name.
25. A non-transitory computer readable medium having stored thereon instructions for providing authenticated domain name service comprising machine executable code which when executed by at least one processor, causes the processor to:
receive a domain name system security extension (DNSSEC) request for a domain name from a DNSSEC compliant computing device;
generate a domain name system (DNS) request corresponding to the DNSSEC request for the domain name;
send the DNS request for the domain name to one or more DNS servers that are not DNSSEC compliant;
receive a DNS compliant response for at least a portion of the domain name from the one or more DNS servers;
create a signed resource record that is DNSSEC compliant when the DNS compliant response from the one or more DNS servers is a denial of existence response for the requested domain name; and
send the signed resource record to the requesting DNSSEC compliant computing device.
26. The medium as set forth in claim 25, wherein the DNS servers are authoritative for a zone associated with the at least a portion of the domain name.
27. The medium as set forth in claim 25, wherein the executable code, when executed by the processor, further causes the processor to:
encrypt the signed resource record using a stored private key; and
perform a hash of the encrypted signed resource record prior to sending the signed resource record to the requesting DNSSEC compliant computing device.
28. The medium as set forth in claim 25, wherein the at least a portion of the domain name comprises a top-level domain name that is known to be authenticated.
29. A method for providing authenticated domain name service implemented by a system comprising one or more network traffic management devices, one or more servers, or one or more clients, the method comprising:
receiving a domain name system security extension (DNSSEC) request for a domain name from a DNSSEC compliant computing device;
generating a domain name system (DNS) request corresponding to the DNSSEC request for the domain name;
sending the DNS request for the domain name to one or more DNS servers that are not DNSSEC compliant;
receiving a DNS compliant response for at least a portion of the domain name from the one or more DNS servers;
creating a signed resource record that is DNSSEC compliant when the DNS compliant response from the one or more DNS servers is a denial of existence response for the requested domain name; and
sending the signed resource record to the requesting DNSSEC compliant computing device.
30. The method as set forth in claim 29, wherein the DNS servers are authoritative for a zone associated with the at least a portion of the domain name.
31. The method as set forth in claim 29, further comprising:
encrypting the signed resource record using a stored private key; and
performing a hash of the encrypted signed resource record prior to sending the signed resource record to the requesting DNSSEC compliant computing device.
32. The method as set forth in claim 25, wherein the at least a portion of the domain name comprises a top-level domain name that is known to be authenticated.
33. A system comprising one or more network traffic management devices, one or more servers, or one or more clients, the system comprising:
one or more processors; and
memory comprising programmed instructions stored in the memory, the one or more processors configured to be capable of executing the programmed instructions stored in the memory to:
receive a domain name system security extension (DNSSEC) request for a domain name from a DNSSEC compliant computing device;
generate a domain name system (DNS) request corresponding to the DNSSEC request for the domain name;
send the DNS request for the domain name to one or more DNS servers that are not DNSSEC compliant;
receive a DNS compliant response for at least a portion of the domain name from the one or more DNS servers;
create a signed resource record that is DNSSEC compliant when the DNS compliant response from the one or more DNS servers is a denial of existence response for the requested domain name; and
send the signed resource record to the requesting DNSSEC compliant computing device.
34. The system as set forth in claim 33, wherein the DNS servers are authoritative for a zone associated with the at least a portion of the domain name.
35. The system as set forth in claim 33, wherein the one or more processors are further configured to be capable of executing the programmed instructions stored in the memory to:
encrypt the signed resource record using a stored private key; and
perform a hash of the encrypted signed resource record prior to sending the signed resource record to the requesting DNSSEC compliant computing device.
36. The system as set forth in claim 33, wherein the at least a portion of the domain name comprises a top-level domain name that is known to be authenticated.
US15/286,436 2010-07-14 2016-10-05 Methods for DNSSEC proxying and deployment amelioration and systems thereof Active USRE47019E1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US15/286,436 USRE47019E1 (en) 2010-07-14 2016-10-05 Methods for DNSSEC proxying and deployment amelioration and systems thereof

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US12/836,053 US8347100B1 (en) 2010-07-14 2010-07-14 Methods for DNSSEC proxying and deployment amelioration and systems thereof
US13/687,826 US8856898B1 (en) 2010-07-14 2012-11-28 Methods for DNSSEC proxying and deployment amelioration and systems thereof
US15/286,436 USRE47019E1 (en) 2010-07-14 2016-10-05 Methods for DNSSEC proxying and deployment amelioration and systems thereof

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US13/687,826 Reissue US8856898B1 (en) 2010-07-14 2012-11-28 Methods for DNSSEC proxying and deployment amelioration and systems thereof

Publications (1)

Publication Number Publication Date
USRE47019E1 true USRE47019E1 (en) 2018-08-28

Family

ID=47388438

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/836,053 Active 2031-06-30 US8347100B1 (en) 2010-07-14 2010-07-14 Methods for DNSSEC proxying and deployment amelioration and systems thereof
US13/687,826 Ceased US8856898B1 (en) 2010-07-14 2012-11-28 Methods for DNSSEC proxying and deployment amelioration and systems thereof
US15/286,436 Active USRE47019E1 (en) 2010-07-14 2016-10-05 Methods for DNSSEC proxying and deployment amelioration and systems thereof

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US12/836,053 Active 2031-06-30 US8347100B1 (en) 2010-07-14 2010-07-14 Methods for DNSSEC proxying and deployment amelioration and systems thereof
US13/687,826 Ceased US8856898B1 (en) 2010-07-14 2012-11-28 Methods for DNSSEC proxying and deployment amelioration and systems thereof

Country Status (1)

Country Link
US (3) US8347100B1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11019022B1 (en) * 2020-01-28 2021-05-25 F5 Networks, Inc. Processing packets with returnable values
US20210288937A1 (en) * 2020-03-12 2021-09-16 Vmware, Inc. Domain name service (dns) server cache table validation
US20210385187A1 (en) * 2018-10-15 2021-12-09 Huawei Technologies Co., Ltd. Method and device for performing domain name resolution by sending key value to grs server
US11245661B2 (en) * 2019-09-05 2022-02-08 Wangsu Science & Technology Co., Ltd. DNS resolution method, authoritative DNS server and DNS resolution system
US11271894B1 (en) * 2021-03-10 2022-03-08 Accenture Global Solutions Limited Systems, devices, and methods for private query and exchange of domain information

Families Citing this family (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10157280B2 (en) 2009-09-23 2018-12-18 F5 Networks, Inc. System and method for identifying security breach attempts of a website
US8671221B2 (en) * 2010-11-17 2014-03-11 Hola Networks Ltd. Method and system for increasing speed of domain name system resolution within a computing device
US8645700B2 (en) 2011-04-29 2014-02-04 Verisign, Inc. DNSSEC inline signing
US9130917B2 (en) * 2011-05-02 2015-09-08 Verisign, Inc. DNSSEC signing server
US8966625B1 (en) * 2011-05-24 2015-02-24 Palo Alto Networks, Inc. Identification of malware sites using unknown URL sites and newly registered DNS addresses
US8555388B1 (en) 2011-05-24 2013-10-08 Palo Alto Networks, Inc. Heuristic botnet detection
FR2980062B1 (en) * 2011-09-13 2014-02-21 Sagemcom Broadband Sas SECURE DATA EXCHANGE METHOD, DEVICE AND COMMUNICATION SYSTEM IMPLEMENTING SAID METHOD
US9609017B1 (en) 2012-02-20 2017-03-28 F5 Networks, Inc. Methods for preventing a distributed denial service attack and devices thereof
US9083727B1 (en) * 2012-04-11 2015-07-14 Artemis Internet Inc. Securing client connections
US9264395B1 (en) 2012-04-11 2016-02-16 Artemis Internet Inc. Discovery engine
US9106661B1 (en) 2012-04-11 2015-08-11 Artemis Internet Inc. Computing resource policy regime specification and verification
US8799482B1 (en) 2012-04-11 2014-08-05 Artemis Internet Inc. Domain policy specification and enforcement
US8990392B1 (en) 2012-04-11 2015-03-24 NCC Group Inc. Assessing a computing resource for compliance with a computing resource policy regime specification
US9215239B1 (en) 2012-09-28 2015-12-15 Palo Alto Networks, Inc. Malware detection based on traffic analysis
US9104870B1 (en) 2012-09-28 2015-08-11 Palo Alto Networks, Inc. Detecting malware
US9961110B2 (en) 2013-03-15 2018-05-01 Verisign, Inc. Systems and methods for pre-signing of DNSSEC enabled zones into record sets
JP5846652B2 (en) * 2013-04-19 2016-01-20 Necプラットフォームズ株式会社 Proxy DNS server having cache function and DNS query response method
US9306751B2 (en) * 2013-04-30 2016-04-05 Kathie Wilson Secure time and crypto system
US9613210B1 (en) 2013-07-30 2017-04-04 Palo Alto Networks, Inc. Evaluating malware in a virtual machine using dynamic patching
US9811665B1 (en) 2013-07-30 2017-11-07 Palo Alto Networks, Inc. Static and dynamic security analysis of apps for mobile devices
US10019575B1 (en) 2013-07-30 2018-07-10 Palo Alto Networks, Inc. Evaluating malware in a virtual machine using copy-on-write
CN104135471B (en) * 2014-07-14 2018-01-23 嘉兴市辰翔信息科技有限公司 The anti-abduction communication means of DNS
US9489516B1 (en) 2014-07-14 2016-11-08 Palo Alto Networks, Inc. Detection of malware using an instrumented virtual machine environment
US11838851B1 (en) 2014-07-15 2023-12-05 F5, Inc. Methods for managing L7 traffic classification and devices thereof
US10182013B1 (en) 2014-12-01 2019-01-15 F5 Networks, Inc. Methods for managing progressive image delivery and devices thereof
US9805193B1 (en) 2014-12-18 2017-10-31 Palo Alto Networks, Inc. Collecting algorithmically generated domains
US9542554B1 (en) 2014-12-18 2017-01-10 Palo Alto Networks, Inc. Deduplicating malware
US11895138B1 (en) * 2015-02-02 2024-02-06 F5, Inc. Methods for improving web scanner accuracy and devices thereof
US9954840B2 (en) * 2015-05-08 2018-04-24 Cloudflare, Inc. Generating a negative answer to a domain name system query that indicates resource records as existing for the domain name regardless of whether those resource records actually exist for the domain name
US10033699B2 (en) * 2015-05-08 2018-07-24 Cloudflare, Inc. Transparent DNSSEC-signing proxy
US10516654B2 (en) * 2016-03-15 2019-12-24 Intel Corporation System, apparatus and method for key provisioning delegation
CN106302859B (en) * 2016-09-09 2019-03-08 中国互联网络信息中心 A kind of response and processing method of DNSSEC negative response
US11496438B1 (en) 2017-02-07 2022-11-08 F5, Inc. Methods for improved network security using asymmetric traffic delivery and devices thereof
US10791119B1 (en) 2017-03-14 2020-09-29 F5 Networks, Inc. Methods for temporal password injection and devices thereof
US10931662B1 (en) 2017-04-10 2021-02-23 F5 Networks, Inc. Methods for ephemeral authentication screening and devices thereof
US11032127B2 (en) * 2017-06-26 2021-06-08 Verisign, Inc. Resilient domain name service (DNS) resolution when an authoritative name server is unavailable
US11658995B1 (en) 2018-03-20 2023-05-23 F5, Inc. Methods for dynamically mitigating network attacks and devices thereof
US10956573B2 (en) 2018-06-29 2021-03-23 Palo Alto Networks, Inc. Dynamic analysis techniques for applications
US11010474B2 (en) 2018-06-29 2021-05-18 Palo Alto Networks, Inc. Dynamic analysis techniques for applications
US11196765B2 (en) 2019-09-13 2021-12-07 Palo Alto Networks, Inc. Simulating user interactions for malware analysis

Citations (875)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3950735A (en) 1974-01-04 1976-04-13 Honeywell Information Systems, Inc. Method and apparatus for dynamically controlling read/write operations in a peripheral subsystem
US4644532A (en) 1985-06-10 1987-02-17 International Business Machines Corporation Automatic update of topology in a hybrid network
JPS6310250A (en) 1986-06-30 1988-01-16 Fujitsu Ltd Managing system for virtual logical volume
US4897781A (en) 1987-02-13 1990-01-30 International Business Machines Corporation System and method for using cached data at a local node after re-opening a file at a remote node in a distributed networking environment
US4965772A (en) 1987-06-15 1990-10-23 International Business Machines Corporation Method and apparatus for communication network alert message construction
US4993030A (en) 1988-04-22 1991-02-12 Amdahl Corporation File system for a plurality of storage classes
US5023826A (en) 1990-01-11 1991-06-11 Bull Hn Information Systems Inc. Apparatus for skipping arithmetic calculations involving leading zeros
WO1991014326A2 (en) 1990-03-05 1991-09-19 Massachusetts Institute Of Technology Switching networks with expansive and/or dispersive logical clusters for message routing
US5053953A (en) 1990-01-05 1991-10-01 Bull Hn Information Systems Inc. Apparatus for aligning arithmetic operands during fetch
US5167024A (en) 1989-09-08 1992-11-24 Apple Computer, Inc. Power management for a laptop computer with slow and sleep modes
US5218695A (en) 1990-02-05 1993-06-08 Epoch Systems, Inc. File server system having high-speed write execution
US5282201A (en) 1987-12-22 1994-01-25 Kendall Square Research Corporation Dynamic packet routing network
US5299312A (en) 1990-11-15 1994-03-29 Massachusetts Institute Of Technology Network fault recovery by controllable switching of subnetworks
US5303368A (en) 1989-02-28 1994-04-12 Kabushiki Kaisha Toshiba Dead lock preventing method for data base system
CA2080530A1 (en) 1992-10-14 1994-04-15 Ho Kee Chiu Dynamic networking
US5327529A (en) 1990-09-24 1994-07-05 Geoworks Process of designing user's interfaces for application programs
US5367635A (en) 1991-08-29 1994-11-22 Hewlett-Packard Company Network management agent with user created objects providing additional functionality
JPH06332782A (en) 1993-03-22 1994-12-02 Hitachi Ltd File server system and file access controlling method therefor
US5371852A (en) 1992-10-14 1994-12-06 International Business Machines Corporation Method and apparatus for making a cluster of computers appear as a single host on a network
WO1995005712A2 (en) 1993-08-13 1995-02-23 Frank Thomson Leighton Secret key exchange
US5406502A (en) 1993-06-29 1995-04-11 Elbit Ltd. System and method for measuring the operation of a device
US5473362A (en) 1993-11-30 1995-12-05 Microsoft Corporation Video on demand system comprising stripped data across plural storable devices with time multiplex scheduling
US5475857A (en) 1990-09-28 1995-12-12 Massachusetts Institute Of Technology Express channels for diminishing latency and increasing throughput in an interconnection network
JPH0821924A (en) 1994-07-05 1996-01-23 Fuji Elelctrochem Co Ltd Plural ports optical component having plural transmission paths
US5511177A (en) 1991-11-21 1996-04-23 Hitachi, Ltd. File data multiplexing method and data processing system
US5517617A (en) 1994-06-29 1996-05-14 Digital Equipment Corporation Automatic assignment of addresses in a computer communications network
US5519694A (en) 1994-02-04 1996-05-21 Massachusetts Institute Of Technology Construction of hierarchical networks through extension
US5528701A (en) 1994-09-02 1996-06-18 Panasonic Technologies, Inc. Trie based method for indexing handwritten databases
US5537585A (en) 1994-02-25 1996-07-16 Avail Systems Corporation Data storage management for network interconnected processors
US5548724A (en) 1993-03-22 1996-08-20 Hitachi, Ltd. File server system and file access control method of the same
US5550965A (en) 1993-12-27 1996-08-27 Lucent Technologies Inc. Method and system for operating a data processor to index primary data in real time with iconic table of contents
EP0738970A1 (en) 1995-04-17 1996-10-23 AT&T IPM Corp. Methods and apparatus for storage and retrieval of name space information in a distributed computing system
EP0744850A2 (en) 1995-05-22 1996-11-27 Fore Systems, Inc. Digital network including early packet discard mechanism with adjustable threshold
US5581764A (en) 1993-04-30 1996-12-03 Novadigm, Inc. Distributed computer network including hierarchical resource information structure and related method of distributing resources
US5583995A (en) 1995-01-30 1996-12-10 Mrj, Inc. Apparatus and method for data storage and retrieval using bandwidth allocation
JPH08328760A (en) 1995-06-01 1996-12-13 Hitachi Ltd Disk array device
US5586260A (en) 1993-02-12 1996-12-17 Digital Equipment Corporation Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
US5590320A (en) 1994-09-14 1996-12-31 Smart Storage, Inc. Computer file directory system
JPH0916510A (en) 1995-06-29 1997-01-17 Ricoh Co Ltd File copying machine
US5596742A (en) 1993-04-02 1997-01-21 Massachusetts Institute Of Technology Virtual interconnections for reconfigurable logic systems
US5606665A (en) 1994-07-01 1997-02-25 Digital Equipment Corporation Buffer descriptor prefetch in network and I/O design
US5611049A (en) 1992-06-03 1997-03-11 Pitts; William M. System for accessing distributed data cache channel at each network node to pass requests and data
WO1997009805A1 (en) 1995-09-05 1997-03-13 Massachusetts Institute Of Technology Scalable, self-organizing packet radio network having decentralized channel management providing collision-free packet transfer
US5623490A (en) 1993-06-09 1997-04-22 Intelligence-At-Large Method and apparatus for multiple media digital communication system
US5649194A (en) 1993-12-29 1997-07-15 Microsoft Corporation Unification of directory service with file system services
US5649200A (en) 1993-01-08 1997-07-15 Atria Software, Inc. Dynamic rule-based version control system
US5659619A (en) 1994-05-11 1997-08-19 Aureal Semiconductor, Inc. Three-dimensional virtual audio display employing reduced complexity imaging filters
US5663018A (en) 1996-05-28 1997-09-02 Motorola Pattern writing method during X-ray mask fabrication
US5668943A (en) 1994-10-31 1997-09-16 International Business Machines Corporation Virtual shared disks with application transparent recovery
US5692180A (en) 1995-01-31 1997-11-25 International Business Machines Corporation Object-oriented cell directory database for a distributed computing environment
WO1997045800A1 (en) 1996-05-30 1997-12-04 Massachusetts Institute Of Technology Querying heterogeneous data sources distributed over a network using context interchange and data extraction
US5721779A (en) 1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party
US5752023A (en) 1996-04-24 1998-05-12 Massachusetts Institute Of Technology Networked database system for geographically dispersed global sustainability data
US5761484A (en) 1994-04-01 1998-06-02 Massachusetts Institute Of Technology Virtual interconnections for reconfigurable logic systems
US5768423A (en) 1994-09-02 1998-06-16 Panasonic Technologies Inc. Trie structure based method and apparatus for indexing and searching handwritten databases with dynamic search sequencing
US5774660A (en) 1996-08-05 1998-06-30 Resonate, Inc. World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-node network
US5790554A (en) 1995-10-04 1998-08-04 Bay Networks, Inc. Method and apparatus for processing data packets in a network
US5802052A (en) 1996-06-26 1998-09-01 Level One Communication, Inc. Scalable high performance switch element for a shared memory packet or ATM cell switch fabric
US5806061A (en) 1997-05-20 1998-09-08 Hewlett-Packard Company Method for cost-based optimization over multimeida repositories
US5812550A (en) 1995-12-23 1998-09-22 Electronics And Telecommunications Research Institute Asynchronous transfer mode (ATM) layer function processing apparatus with an enlarged structure
US5825772A (en) 1995-11-15 1998-10-20 Cabletron Systems, Inc. Distributed connection-oriented services for switched communications networks
US5832496A (en) 1995-10-12 1998-11-03 Ncr Corporation System and method for performing intelligent analysis of a computer database
US5832283A (en) 1995-03-06 1998-11-03 Intel Corporation Method and apparatus for providing unattended on-demand availability of a computer system
US5838970A (en) 1994-10-04 1998-11-17 Recognition International Inc. Object-oriented computer environment and related method
US5862325A (en) 1996-02-29 1999-01-19 Intermind Corporation Computer-based communication system and method using metadata defining a control structure
WO1999005829A1 (en) 1997-07-25 1999-02-04 Massachusetts Institute Of Technology Cost based routing protocol
WO1999006913A1 (en) 1997-08-01 1999-02-11 Arrowpoint Communications, Inc. Content-aware flow switching
US5875296A (en) 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
WO1999010858A2 (en) 1997-08-29 1999-03-04 Leighton F Thomson Method for protecting content using watermarking
US5884303A (en) 1996-03-15 1999-03-16 International Computers Limited Parallel searching technique
US5892932A (en) 1995-11-21 1999-04-06 Fore Systems, Inc. Reprogrammable switching apparatus and method
US5893086A (en) 1997-07-11 1999-04-06 International Business Machines Corporation Parallel file system and method with extensible hashing
US5897638A (en) 1997-06-16 1999-04-27 Ab Initio Software Corporation Parallel virtual file system
US5905990A (en) 1997-06-23 1999-05-18 International Business Machines Corporation File system viewpath mechanism
US5917998A (en) 1996-07-26 1999-06-29 International Business Machines Corporation Method and apparatus for establishing and maintaining the status of membership sets used in mirrored read and write input/output without logging
US5919247A (en) 1996-07-24 1999-07-06 Marimba, Inc. Method for the distribution of code and data updates
US5920873A (en) 1996-12-06 1999-07-06 International Business Machines Corporation Data management control system for file and database
WO1999039373A2 (en) 1998-01-30 1999-08-05 Trustees Of Princeton University Fabrication of organic semiconductor devices using ink jet printing
US5937406A (en) 1997-01-31 1999-08-10 Informix Software, Inc. File system interface to a database
US5941988A (en) 1997-01-27 1999-08-24 International Business Machines Corporation Session and transport layer proxies via TCP glue
US5946690A (en) 1996-12-17 1999-08-31 Inca Technology, Inc. NDC consistency reconnect mechanism
US5951694A (en) 1995-06-07 1999-09-14 Microsoft Corporation Method of redirecting a client service session to a second application server without interrupting the session by forwarding service-specific information to the second server
US5958053A (en) 1997-01-30 1999-09-28 At&T Corp. Communications protocol with improved security
US5959990A (en) 1996-03-12 1999-09-28 Bay Networks, Inc. VLAN frame format
JPH11282741A (en) 1998-03-27 1999-10-15 Hitachi Ltd Mounting method, film access method for directory and access authority decision method
US5974460A (en) 1997-06-16 1999-10-26 International Business Machines Corporation Apparatus and method for selecting an optimum telecommunications link
US5983281A (en) 1997-04-24 1999-11-09 International Business Machines Corporation Load balancing in a multiple network environment
US5988847A (en) 1997-08-22 1999-11-23 Honeywell Inc. Systems and methods for implementing a dynamic cache in a supervisory control system
US5991302A (en) 1997-04-10 1999-11-23 Cisco Technology, Inc. Technique for maintaining prioritization of data transferred among heterogeneous nodes of a computer network
US5999664A (en) 1997-11-14 1999-12-07 Xerox Corporation System for searching a corpus of document images by user specified document layout components
WO1999064967A1 (en) 1998-06-12 1999-12-16 Telefonaktiebolaget Lm Ericsson (Publ) A method and a system for transmitting a cookie
US6006260A (en) 1997-06-03 1999-12-21 Keynote Systems, Inc. Method and apparatus for evalutating service to a user over the internet
US6012083A (en) 1996-09-24 2000-01-04 Ricoh Company Ltd. Method and apparatus for document processing using agents to process transactions created based on document content
WO2000004422A2 (en) 1998-07-17 2000-01-27 Leighton F Thomson Method for image processing to facilitate copy protection
WO2000004458A1 (en) 1998-07-14 2000-01-27 Massachusetts Institute Of Technology Global document hosting system utilizing embedded content distributed ghost servers
US6026452A (en) 1997-02-26 2000-02-15 Pitts; William Michael Network distributed site cache RAM claimed as up/down stream request/reply channel for storing anticipated data and meta data
US6029175A (en) 1995-10-26 2000-02-22 Teknowledge Corporation Automatic retrieval of changed files by a network software agent
US6029168A (en) 1998-01-23 2000-02-22 Tricord Systems, Inc. Decentralized file mapping in a striped network file system in a distributed computing environment
US6038233A (en) 1996-07-04 2000-03-14 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US6041365A (en) 1985-10-29 2000-03-21 Kleinerman; Aurel Apparatus and method for high performance remote application gateway servers
US6044367A (en) 1996-08-02 2000-03-28 Hewlett-Packard Company Distributed I/O store
US6047129A (en) 1993-12-30 2000-04-04 Frye; Russell Software updating and distribution
US6051169A (en) 1997-08-27 2000-04-18 International Business Machines Corporation Vacuum baking process
US6067558A (en) 1997-09-18 2000-05-23 Wendt; James Gordon Method and apparatus for providing increased content from a resource constrained device
US6072942A (en) 1996-09-18 2000-06-06 Secure Computing Corporation System and method of electronic mail filtering using interconnected nodes
US6078929A (en) 1996-06-07 2000-06-20 At&T Internet file system
US6078956A (en) 1997-09-08 2000-06-20 International Business Machines Corporation World wide web end user response time monitor
JP2000183935A (en) 1998-12-10 2000-06-30 Omron Corp Node and intra-node data processing method
US6085234A (en) 1994-11-28 2000-07-04 Inca Technology, Inc. Remote file services network-infrastructure cache
US6088694A (en) 1998-03-31 2000-07-11 International Business Machines Corporation Continuous availability and efficient backup for externally referenced objects
US6092196A (en) 1997-11-25 2000-07-18 Nortel Networks Limited HTTP distributed remote user authentication system
US6111876A (en) 1996-03-12 2000-08-29 Nortel Networks Limited VLAN frame format
US6119234A (en) 1997-06-27 2000-09-12 Sun Microsystems, Inc. Method and apparatus for client-host communication over a computer network
US6118784A (en) 1996-11-01 2000-09-12 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6128657A (en) 1996-02-14 2000-10-03 Fujitsu Limited Load sharing system
US6128279A (en) 1997-10-06 2000-10-03 Web Balance, Inc. System for balancing loads among network servers
US6128627A (en) 1998-04-15 2000-10-03 Inktomi Corporation Consistent data storage in an object cache
US6128717A (en) 1998-01-20 2000-10-03 Quantum Corporation Method and apparatus for storage application programming interface for digital mass storage and retrieval based upon data object type or size and characteristics of the data storage device
WO2000058870A2 (en) 1999-03-31 2000-10-05 America Online, Inc. Handling a request for information provided by a network site
US6154777A (en) 1996-07-01 2000-11-28 Sun Microsystems, Inc. System for context-dependent name resolution
US6161185A (en) 1998-03-06 2000-12-12 Mci Communications Corporation Personal authentication system and method for multiple computer platform
US6161145A (en) 1997-05-08 2000-12-12 International Business Machines Corporation Updating server-related data at a client
US6160874A (en) 1997-10-21 2000-12-12 Mci Communications Corporation Validation gateway
US6170022B1 (en) 1998-04-03 2001-01-02 International Business Machines Corporation Method and system for monitoring and controlling data flow in a network congestion state by changing each calculated pause time by a random amount
US6178423B1 (en) 1998-06-23 2001-01-23 Microsoft Corporation System and method for recycling numerical values in a computer system
US6181336B1 (en) 1996-05-31 2001-01-30 Silicon Graphics, Inc. Database-independent, scalable, object-oriented architecture and API for managing digital multimedia assets
US6182139B1 (en) 1996-08-05 2001-01-30 Resonate Inc. Client-side resource-based load-balancing with delayed-resource-binding using TCP state migration to WWW server farm
US6192051B1 (en) 1999-02-26 2001-02-20 Redstone Communications, Inc. Network router search engine using compressed tree forwarding table
EP1081918A2 (en) 1999-09-04 2001-03-07 Hewlett-Packard Company Providing secure access through network firewalls
US6202156B1 (en) 1997-09-12 2001-03-13 Sun Microsystems, Inc. Remote access-controlled communication
US6223206B1 (en) 1994-05-11 2001-04-24 International Business Machines Corporation Method and system for load balancing by replicating a portion of a file being read by a first stream onto second device and reading portion with a second stream capable of accessing
US6233612B1 (en) 1998-08-31 2001-05-15 International Business Machines Corporation Dynamic network protocol management information base options
US6233648B1 (en) 1997-12-26 2001-05-15 Kabushiki Kaisha Toshiba Disk storage system and data update method used therefor
US6237008B1 (en) 1998-07-20 2001-05-22 International Business Machines Corporation System and method for enabling pair-pair remote copy storage volumes to mirror data in another storage volume
US6246684B1 (en) 1997-12-24 2001-06-12 Nortel Networks Limited Method and apparatus for re-ordering data packets in a network environment
US6253226B1 (en) 1998-06-24 2001-06-26 Oracle Corporation Duration-based memory management of complex objects
US6253230B1 (en) 1998-09-22 2001-06-26 International Business Machines Corporation Distributed scalable device for selecting a server from a server cluster and a switched path to the selected server
US6256031B1 (en) 1998-06-26 2001-07-03 Microsoft Corporation Integration of physical and virtual namespace
US6260070B1 (en) 1998-06-30 2001-07-10 Dhaval N. Shah System and method for determining a preferred mirrored service in a network by evaluating a border gateway protocol
US6259405B1 (en) 1995-06-06 2001-07-10 Wayport, Inc. Geographic based communications service
US20010007560A1 (en) 2000-01-11 2001-07-12 Michio Masuda Multi-layer class identifying communication apparatus with priority control
US6263368B1 (en) 1997-06-19 2001-07-17 Sun Microsystems, Inc. Network load balancing for multi-computer server by counting message packets to/from multi-computer server
US20010009554A1 (en) 1997-03-17 2001-07-26 Katseff Howard Paul Methods and apparatus for providing improved quality of packet transmission in applications such as internet telephony
US20010014891A1 (en) 1996-05-24 2001-08-16 Eric M. Hoffert Display of media previews
US6282610B1 (en) 1997-03-31 2001-08-28 Lsi Logic Corporation Storage controller providing store-and-forward mechanism in distributed data storage system
US6289345B1 (en) 1997-06-26 2001-09-11 Fujitsu Limited Design information management system having a bulk data server and a metadata server
US6289012B1 (en) 1998-08-03 2001-09-11 Instanton Corporation High concurrency data download apparatus and method
US20010023442A1 (en) 1999-07-15 2001-09-20 Richard R. Masters Method and system for storing load balancing information with an http cookie
US6298380B1 (en) 1997-07-31 2001-10-02 Cisco Technology, Inc. Method and apparatus for reducing overhead on a proxied connection
US6304913B1 (en) 1998-11-09 2001-10-16 Telefonaktiebolaget L M Ericsson (Publ) Internet system and method for selecting a closest server from a plurality of alternative servers
US6308162B1 (en) 1997-05-21 2001-10-23 Khimetrics, Inc. Method for controlled optimization of enterprise planning models
US6324581B1 (en) 1999-03-03 2001-11-27 Emc Corporation File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems
US20010047293A1 (en) 1999-01-26 2001-11-29 Waller Matthew A. System, method and article of manufacture to optimize inventory and inventory investment utilization in a collaborative context
US6327622B1 (en) 1998-09-03 2001-12-04 Sun Microsystems, Inc. Load balancing in a network environment
US6330574B1 (en) 1997-08-05 2001-12-11 Fujitsu Limited Compression/decompression of tags in markup documents by creating a tag code/decode table based on the encoding of tags in a DTD included in the documents
US20010051955A1 (en) 2000-03-17 2001-12-13 Wong John P. Mirror file system
US6338082B1 (en) 1999-03-22 2002-01-08 Eric Schneider Method, product, and apparatus for requesting a network resource
US6339785B1 (en) 1999-11-24 2002-01-15 Idan Feigenbaum Multi-server file download
US20020010783A1 (en) 1999-12-06 2002-01-24 Leonard Primak System and method for enhancing operation of a web server cluster
US6343324B1 (en) 1999-09-13 2002-01-29 International Business Machines Corporation Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
US20020012352A1 (en) 1998-12-18 2002-01-31 Goran Hansson Internet protocol handler for telecommunications platform with processor cluster
US6347339B1 (en) 1998-12-01 2002-02-12 Cisco Technology, Inc. Detecting an active network node using a login attempt
US6349343B1 (en) 1994-09-15 2002-02-19 Visual Edge Software Limited System and method for providing interoperability among heterogeneous object systems
US6353848B1 (en) 1998-07-31 2002-03-05 Flashpoint Technology, Inc. Method and system allowing a client computer to access a portable digital image capture unit over a network
US20020032777A1 (en) 2000-09-11 2002-03-14 Yoko Kawata Load sharing apparatus and a load estimation method
US6360270B1 (en) 1998-11-16 2002-03-19 Hewlett-Packard Company Hybrid and predictive admission control strategies for a server
US20020035537A1 (en) 1999-01-26 2002-03-21 Waller Matthew A. Method for economic bidding between retailers and suppliers of goods in branded, replenished categories
US6363056B1 (en) 1998-07-15 2002-03-26 International Business Machines Corporation Low overhead continuous monitoring of network performance
US20020038360A1 (en) 2000-05-31 2002-03-28 Matthew Andrews System and method for locating a closest server in response to a client domain name request
US6367009B1 (en) 1998-12-17 2002-04-02 International Business Machines Corporation Extending SSL to a multi-tier environment using delegation of authentication and authority
US6370527B1 (en) 1998-12-29 2002-04-09 At&T Corp. Method and apparatus for searching distributed networks using a plurality of search devices
US6374263B1 (en) 1999-07-19 2002-04-16 International Business Machines Corp. System for maintaining precomputed views
US20020049842A1 (en) 2000-08-17 2002-04-25 Matthias Huetsch Load balancing method and system
US6389462B1 (en) 1998-12-16 2002-05-14 Lucent Technologies Inc. Method and apparatus for transparently directing requests for web objects to proxy caches
US6389433B1 (en) 1999-07-16 2002-05-14 Microsoft Corporation Method and system for automatically merging files into a single instance store
US20020059428A1 (en) 1998-11-10 2002-05-16 Netscaler, Inc. Internet client-server multiplexer
WO2002039696A2 (en) 2000-11-03 2002-05-16 The Board Of Regents Of The University Of Nebraska Assured quality-of-service request scheduling
US20020059263A1 (en) 2000-06-27 2002-05-16 Seiji Shima Data management system for storages
US6393581B1 (en) 1996-08-29 2002-05-21 Cornell Research Foundation, Inc. Reliable time delay-constrained cluster computing
US6397246B1 (en) 1998-11-13 2002-05-28 International Business Machines Corporation Method and system for processing document requests in a network system
US6396833B1 (en) 1998-12-02 2002-05-28 Cisco Technology, Inc. Per user and network routing tables
US20020065810A1 (en) 2000-11-29 2002-05-30 Bradley Mark W. File system translators and methods for implementing the same
US20020065848A1 (en) 2000-08-21 2002-05-30 Richard Walker Simultaneous multi-user document editing system
US20020073105A1 (en) 2000-12-12 2002-06-13 Matsushita Electric Industrial Co., File management method, content recording/playback apparatus and content recording program
US6412004B1 (en) 1997-03-27 2002-06-25 Microsoft Corporation Metaserver for a multimedia distribution network
US20020083067A1 (en) 2000-09-28 2002-06-27 Pablo Tamayo Enterprise web mining system and method
US20020083118A1 (en) 2000-10-26 2002-06-27 Sim Siew Yong Method and apparatus for managing a plurality of servers in a content delivery network
US20020087744A1 (en) 2000-11-01 2002-07-04 Aeroflex Altair Cybernetics Corporation Information transformation software engine
US20020087571A1 (en) 2000-10-20 2002-07-04 Kevin Stapel System and method for dynamic generation of structured documents
US20020087887A1 (en) 2000-09-19 2002-07-04 Busam Vincent R. Device-to-device network
WO2002056181A2 (en) 2001-01-11 2002-07-18 Force Communications Inc Z File switch and switched file system
US20020099829A1 (en) 2000-11-27 2002-07-25 Richards Kenneth W. Filter proxy system and method
US20020103916A1 (en) 2000-09-07 2002-08-01 Benjie Chen Thwarting connection-based denial of service attacks
US20020103823A1 (en) 2001-02-01 2002-08-01 International Business Machines Corporation Method and system for extending the performance of a web crawler
US6430562B1 (en) 1999-03-01 2002-08-06 Electronic Data Systems Corporation Integrated resource management system and method
US6434081B1 (en) 2000-05-12 2002-08-13 Micron Technology, Inc. Calibration technique for memory devices
US20020112061A1 (en) 2001-02-09 2002-08-15 Fu-Tai Shih Web-site admissions control with denial-of-service trap for incomplete HTTP requests
US6438595B1 (en) 1998-06-24 2002-08-20 Emc Corporation Load balancing using directory services in a data processing system
US6446108B1 (en) 1997-07-18 2002-09-03 Lucent Technologies Inc. Method for wide area network service location
US20020133330A1 (en) 2001-03-13 2002-09-19 Microsoft Corporation Provisioning computing services via an on-line networked computing environment
US20020133491A1 (en) 2000-10-26 2002-09-19 Prismedia Networks, Inc. Method and system for managing distributed content and related metadata
US20020138615A1 (en) 2001-03-21 2002-09-26 Schmeling Garth F. System and method for device management through world wide web confederacy
US20020143819A1 (en) 2000-05-31 2002-10-03 Cheng Han Web service syndication system
US20020143909A1 (en) 2001-03-27 2002-10-03 International Business Machines Corporation Apparatus and method for managing multiple user identities on a networked computer system
US20020147630A1 (en) 2001-04-04 2002-10-10 Rose Dawn M. Assortment decisions
US6466580B1 (en) 1999-02-23 2002-10-15 Advanced Micro Devices, Inc. Method and apparatus for processing high and low priority frame data transmitted in a data communication system
US20020150253A1 (en) 2001-04-12 2002-10-17 Brezak John E. Methods and arrangements for protecting information in forwarded authentication messages
US6469983B2 (en) 2001-02-26 2002-10-22 Maple Optical Systems, Inc. Data packet transmission scheduling using a partitioned heap
US20020156905A1 (en) 2001-02-21 2002-10-24 Boris Weissman System for logging on to servers through a portal computer
US20020162118A1 (en) 2001-01-30 2002-10-31 Levy Kenneth L. Efficient interactive TV
US20020160161A1 (en) 2001-02-28 2002-10-31 Canon Kabushiki Kaisha Recording medium, image-forming Method employing the same, process for producing the same
US20020161913A1 (en) 2001-04-30 2002-10-31 Manuel Gonzalez System and method for performing a download
US20020161911A1 (en) 2001-04-19 2002-10-31 Thomas Pinckney Systems and methods for efficient memory allocation for streaming of multimedia files
US6477544B1 (en) 1999-07-16 2002-11-05 Microsoft Corporation Single instance store for file systems
US6480476B1 (en) 1998-10-15 2002-11-12 Telefonaktiebolaget Lm Ericsson (Publ) Variable sleep mode for mobile stations in a mobile communications
US6484261B1 (en) 1998-02-17 2002-11-19 Cisco Technology, Inc. Graphical network security policy management
US20020174216A1 (en) 2001-05-17 2002-11-21 International Business Machines Corporation Internet traffic analysis tool
US6487561B1 (en) 1998-12-31 2002-11-26 Emc Corporation Apparatus and methods for copying, backing up, and restoring data using a backup segment size larger than the storage block size
US6490624B1 (en) 1998-07-10 2002-12-03 Entrust, Inc. Session management in a stateless network system
US6493804B1 (en) 1997-10-01 2002-12-10 Regents Of The University Of Minnesota Global file system and data storage device locks
US20020188667A1 (en) 2001-05-25 2002-12-12 Ilya Kirnos Management and synchronization application for network file system
US20020194112A1 (en) 2000-11-17 2002-12-19 Depinto Robert System and method for exchanging creative content
US20020194342A1 (en) 2001-06-18 2002-12-19 Transtech Networks Usa, Inc. Content-aware application switch and methods thereof
US20020198993A1 (en) 2000-09-01 2002-12-26 Ncr Corporation Downloading and uploading data in information networks
US20020198956A1 (en) 2001-06-25 2002-12-26 International Business Machines Corporation Method and apparatus for managing a cache
US20030005172A1 (en) 1998-07-22 2003-01-02 Amanda Elizabeth Chessell Apparatus, method and computer program product for client/server computing with improved correspondence between transaction identifiers when supporting subordinate resource manager(s)
US20030009429A1 (en) 2001-06-21 2003-01-09 Jameson Kevin Wade Collection installable knowledge
US20030009528A1 (en) 2001-07-08 2003-01-09 Imran Sharif System and method for using an internet appliance to send/receive digital content files as E-mail attachments
US20030012382A1 (en) 2000-02-08 2003-01-16 Azim Ferchichi Single sign-on process
US6510458B1 (en) 1999-07-15 2003-01-21 International Business Machines Corporation Blocking saves to web browser cache based on content rating
US6510135B1 (en) 1998-12-18 2003-01-21 Nortel Networks Limited Flow-level demultiplexing within routers
US20030018450A1 (en) 2001-07-16 2003-01-23 Stephen Carley System and method for providing composite variance analysis for network operation
US20030018585A1 (en) 2001-07-21 2003-01-23 International Business Machines Corporation Method and system for the communication of assured reputation information
US6513061B1 (en) 1997-10-07 2003-01-28 Hitachi, Ltd. Proxy server selecting server and proxy server
US6516350B1 (en) 1999-06-17 2003-02-04 International Business Machines Corporation Self-regulated resource management of distributed computer resources
US6516351B2 (en) 1997-12-05 2003-02-04 Network Appliance, Inc. Enforcing uniform file-locking for diverse file-locking protocols
US6514085B2 (en) 1999-07-30 2003-02-04 Element K Online Llc Methods and apparatus for computer based training relating to devices
US20030028514A1 (en) 2001-06-05 2003-02-06 Lord Stephen Philip Extended attribute caching in clustered filesystem
US6519643B1 (en) 1999-04-29 2003-02-11 Attachmate Corporation Method and system for a session allocation manager (“SAM”)
US20030033308A1 (en) 2001-08-03 2003-02-13 Patel Sujal M. System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system
US20030033535A1 (en) 2000-01-27 2003-02-13 Gwyn Fisher Method and system for implementing a common user logon to multiple applications
US20030037070A1 (en) 2001-07-31 2003-02-20 Firstlook.Com. Streaming media security system
US20030046291A1 (en) 2000-03-10 2003-03-06 Fascenda Anthony C. System, method and apparatus for utilizing transaction databases in a client - server environment
US20030055723A1 (en) 2001-09-20 2003-03-20 Paul English Vendor comparison, advertising and switching
US20030061240A1 (en) 2001-09-27 2003-03-27 Emc Corporation Apparatus, method and system for writing data to network accessible file system while minimizing risk of cache data loss/ data corruption
US6542936B1 (en) 1997-07-03 2003-04-01 Ipac Acquisition Subsidiary I, Llc System for creating messages including image information
US20030065951A1 (en) 2001-09-28 2003-04-03 Satoshi Igeta Information providing server, terminal apparatus, control method therefor, and information providing system
US20030065956A1 (en) 2001-09-28 2003-04-03 Abhijit Belapurkar Challenge-response data communication protocol
US20030067923A1 (en) * 2001-09-11 2003-04-10 Samsung Electronics Co., Ltd. Method for providing packet data service in a wireless communication system
US20030070069A1 (en) 2001-10-10 2003-04-10 Abhijit Belapurkar Authentication module for an enterprise access management system
US20030069918A1 (en) 2001-10-08 2003-04-10 Tommy Lu Method and apparatus for dynamic provisioning over a world wide web
US6549916B1 (en) 1999-08-05 2003-04-15 Oracle Corporation Event notification system tied to a file system
US20030074301A1 (en) 1999-11-01 2003-04-17 Neal Solomon System, method, and apparatus for an intelligent search agent to access data in a distributed network
US20030074434A1 (en) 2001-10-11 2003-04-17 Jason James L. Determination of message source in network communications
US6553352B2 (en) 2001-05-04 2003-04-22 Demand Tec Inc. Interface for merchandise price optimization
US6556998B1 (en) 2000-05-04 2003-04-29 Matsushita Electric Industrial Co., Ltd. Real-time distributed file system
US6556997B1 (en) 1999-10-07 2003-04-29 Comverse Ltd. Information retrieval system
US6560230B1 (en) 1999-02-01 2003-05-06 Redback Networks Inc. Packet scheduling methods and apparatus
US20030086415A1 (en) 2001-10-02 2003-05-08 Bernhard Urs Peter Method for filtering redundant data packets
US20030105846A1 (en) 2001-11-30 2003-06-05 Koninklijke Philips Electronics N.V. Enhanched UDDI with service push model
US20030105983A1 (en) 2001-12-03 2003-06-05 Brakmo Lawrence Sivert Power reduction in computing devices using micro-sleep intervals
US6578069B1 (en) 1999-10-04 2003-06-10 Microsoft Corporation Method, data structure, and computer program product for identifying a network resource
US20030108052A1 (en) 2001-12-06 2003-06-12 Rumiko Inoue Server load sharing system
US6580717B1 (en) 1996-07-04 2003-06-17 Hitachi, Ltd. Packet communication method and apparatus and a recording medium storing a packet communication program
US20030115218A1 (en) 2001-12-19 2003-06-19 Bobbitt Jared E. Virtual file system
US20030115439A1 (en) 2001-12-19 2003-06-19 Hewlett Packard Company Updating references to a migrated object in a partition-based distributed file system
US20030130945A1 (en) 2002-01-08 2003-07-10 Bottomline Technologies (De) Inc. Electronic transaction processing server with trend based automated transaction evaluation
US20030128708A1 (en) 2002-01-10 2003-07-10 Rumiko Inoue Communication apparatus and relay apparatus for performing packet priority control
US20030139934A1 (en) 2001-12-20 2003-07-24 Intel Corporation Requesting and providing services via a registry
US20030140140A1 (en) 2002-01-18 2003-07-24 Jesse Lahtinen Monitoring the flow of a data stream
US6601084B1 (en) 1997-12-19 2003-07-29 Avaya Technology Corp. Dynamic load balancer for multiple network servers
US6601101B1 (en) 2000-03-15 2003-07-29 3Com Corporation Transparent access to network attached devices
US20030145062A1 (en) 2002-01-14 2003-07-31 Dipanshu Sharma Data conversion server for voice browsing system
US20030145233A1 (en) 2002-01-31 2003-07-31 Poletto Massimiliano Antonio Architecture to thwart denial of service attacks
US20030149781A1 (en) 2001-12-04 2003-08-07 Peter Yared Distributed network identity
US6606663B1 (en) 1998-09-29 2003-08-12 Openwave Systems Inc. Method and apparatus for caching credentials in proxy servers for wireless user agents
US20030159072A1 (en) 2002-02-04 2003-08-21 Atreus Systems Corp. Single sign-on for multiple network -based services
US20030156586A1 (en) 2002-02-19 2003-08-21 Broadcom Corporation Method and apparatus for flexible frame processing and classification engine
US20030163576A1 (en) 2002-02-28 2003-08-28 Bob Janssen Access-control method for a multi-user computer system
US6615267B1 (en) 1997-03-13 2003-09-02 Motorola, Inc. System and method for delivery of information over narrow-band communications links
US6612490B1 (en) 1998-12-22 2003-09-02 International Business Mahines Corporation Extended card file system
US20030171978A1 (en) 2002-03-11 2003-09-11 Jenkins Margalyn Toi Efficient retail item assortment
US20030177388A1 (en) 2002-03-15 2003-09-18 International Business Machines Corporation Authenticated identity translation within a multiple computing unit environment
US20030177364A1 (en) 2002-03-15 2003-09-18 Walsh Robert E. Method for authenticating users
US20030179755A1 (en) 2002-01-18 2003-09-25 Fraser Alexander Gibson System and method for handling prioritized data in a network
US20030191812A1 (en) 2001-12-19 2003-10-09 International Business Machines Corporation Method and system for caching role-specific fragments
US20030195813A1 (en) 2002-04-11 2003-10-16 Kim Pallister System and method for automated auctioning of web services
US6636894B1 (en) 1998-12-08 2003-10-21 Nomadix, Inc. Systems and methods for redirecting users having transparent computer access to a network using a gateway device having redirection capability
US6636503B1 (en) 1998-10-06 2003-10-21 Siemens Information & Communication Networks, Inc. Method and system for communicating with a telecommunications switch
US20030204635A1 (en) 2002-04-27 2003-10-30 Eun-Sook Ko Internet protocol based communication system and method for setting host address and selecting source address therein
US20030212954A1 (en) 2001-12-17 2003-11-13 Patrudu Pilla Gurumurty Conceptual process redactor
US6650640B1 (en) 1999-03-01 2003-11-18 Sun Microsystems, Inc. Method and apparatus for managing a network flow in a high performance network interface
US6650641B1 (en) 1999-07-02 2003-11-18 Cisco Technology, Inc. Network address translation using a forwarding agent
US6654701B2 (en) 2001-08-30 2003-11-25 Spirent Communications Method and apparatus for measuring protocol performance in a data communication network
US6654346B1 (en) 1999-07-19 2003-11-25 Dunti Corporation Communication network across which packets of data are transmitted according to a priority scheme
US20030220835A1 (en) 2002-05-23 2003-11-27 Barnes Melvin L. System, method, and computer program product for providing location based services and mobile e-commerce
US20030221000A1 (en) 2002-05-16 2003-11-27 Ludmila Cherkasova System and method for measuring web service performance using captured network packets
US20030225485A1 (en) 2002-03-23 2003-12-04 Andreas Fritz Method and apparatus for accepting data
US6661802B1 (en) 1998-10-27 2003-12-09 Fujitsu Network Communications, Inc. Congestion management
US20030229665A1 (en) 2002-06-10 2003-12-11 International Business Machines Corporation Systems, methods and computer programs for implementing and accessing web services
US20030236995A1 (en) 2002-06-21 2003-12-25 Fretwell Lyman Jefferson Method and apparatus for facilitating detection of network intrusion
US20040003287A1 (en) 2002-06-28 2004-01-01 Zissimopoulos Vasileios Bill Method for authenticating kerberos users from common web browsers
US20040003266A1 (en) 2000-09-22 2004-01-01 Patchlink Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US20040006575A1 (en) 2002-04-29 2004-01-08 Visharam Mohammed Zubair Method and apparatus for supporting advanced coding formats in media files
US20040006591A1 (en) 2002-07-05 2004-01-08 Fujitsu Limited Information sharing method, information sharing device, and information sharing computer product
US20040010654A1 (en) 2002-07-15 2004-01-15 Yoshiko Yasuda System and method for virtualizing network storages into a single file system view
US20040015783A1 (en) 2002-06-20 2004-01-22 Canon Kabushiki Kaisha Methods for interactively defining transforms and for generating queries by manipulating existing query data
US6683873B1 (en) 1999-12-27 2004-01-27 Cisco Technology, Inc. Methods and apparatus for redirecting network traffic
US20040017825A1 (en) 2002-07-26 2004-01-29 Kenneth Stanwood Scheduling method and system for communication systems that offer multiple classes of service
US20040025013A1 (en) 2002-07-30 2004-02-05 Imagictv Inc. Secure multicast flow
US6690669B1 (en) 1996-11-01 2004-02-10 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6691165B1 (en) 1998-11-10 2004-02-10 Rainfinity, Inc. Distributed server cluster for controlling network traffic
US20040028043A1 (en) 2002-07-31 2004-02-12 Brocade Communications Systems, Inc. Method and apparatus for virtualizing storage devices inside a storage area network fabric
US20040030627A1 (en) 2002-04-19 2004-02-12 Computer Associates Think, Inc. Web services broker
US20040030857A1 (en) 2002-07-31 2004-02-12 Brocade Communications Systems, Inc. Hardware-based translating virtualization switch
US20040030740A1 (en) 2002-08-09 2004-02-12 Stelting Stephen A. Method and system for automating generation of web services from existing service components
US20040028063A1 (en) 2002-07-31 2004-02-12 Brocade Communications Systems, Inc. Host bus adaptor-based virtualization switch
US6694517B1 (en) 1999-08-27 2004-02-17 Diversified Control, Inc. Broadband communication network with low power addressable tap system for controlling subscriber access
US6701415B1 (en) 1999-03-31 2004-03-02 America Online, Inc. Selecting a cache for a request for information
US20040043758A1 (en) 2002-08-29 2004-03-04 Nokia Corporation System and method for providing context sensitive recommendations to digital services
US6708187B1 (en) 1999-06-10 2004-03-16 Alcatel Method for selective LDAP database synchronization
US20040054777A1 (en) 2002-09-16 2004-03-18 Emmanuel Ackaouy Apparatus and method for a proxy cache
US20040059789A1 (en) 1999-10-29 2004-03-25 Annie Shum System and method for tracking messages in an electronic messaging system
US20040064554A1 (en) 2002-09-26 2004-04-01 Kuno Harumi Anne Network service system and mechanism for searching service registries
US20040064544A1 (en) 2002-09-26 2004-04-01 International Business Machines Corporation Coverage analysis of program code that accesses a database
US6718380B1 (en) 1998-10-26 2004-04-06 Cisco Technology, Inc. Method and apparatus for storing policies for policy-based management of network quality of service
US6721794B2 (en) 1999-04-01 2004-04-13 Diva Systems Corp. Method of data management for efficiently storing and retrieving data to respond to user access requests
US20040072569A1 (en) 2002-10-07 2004-04-15 Ntt Docomo, Inc. Mobile communication system, mobile terminal transfer device, and mobile communication method
US6728704B2 (en) 2001-08-27 2004-04-27 Verity, Inc. Method and apparatus for merging result lists from multiple search engines
US20040093474A1 (en) 2002-11-06 2004-05-13 Alvis Lin Snapshot facility allowing preservation of chronological views on block drives
US6738790B1 (en) 1997-10-31 2004-05-18 Oracle International Corporation Approach for accessing large objects
US6738357B1 (en) 1993-06-09 2004-05-18 Btg International Inc. Method and apparatus for multiple media digital communication system
US20040098383A1 (en) 2002-05-31 2004-05-20 Nicholas Tabellion Method and system for intelligent storage management
US6742045B1 (en) 1999-07-02 2004-05-25 Cisco Technology, Inc. Handling packet fragments in a distributed network service environment
US6742035B1 (en) 2000-02-28 2004-05-25 Novell, Inc. Directory-based volume location service for a distributed file system
US20040103283A1 (en) 2000-08-18 2004-05-27 Zoltan Hornak Method and system for authentification of a mobile user via a gateway
US6744776B1 (en) 2000-01-28 2004-06-01 Advanced Micro Devices, Inc. Servicing priority traffic in multiport network switch
US6748420B1 (en) 1999-11-23 2004-06-08 Cisco Technology, Inc. Methods and apparatus for providing shared access to an application
US20040111621A1 (en) 2002-12-05 2004-06-10 Microsoft Corporation Methods and systems for authentication of a user for sub-locations of a network location
US20040111523A1 (en) 2000-11-02 2004-06-10 Howard Hall Tcp/udp acceleration
US6751663B1 (en) 1999-03-25 2004-06-15 Nortel Networks Limited System wide flow aggregation process for aggregating network activity records
US20040117493A1 (en) 2002-11-28 2004-06-17 International Business Machines Corporation Method and system for accessing internet resources through a proxy using the form-based authentication
US6754228B1 (en) 1998-03-31 2004-06-22 Telefonaktiebolaget Lm Ericsson (Publ) Method and device for data flow control
US6754699B2 (en) 2000-07-19 2004-06-22 Speedera Networks, Inc. Content delivery and global traffic management network system
US6754215B1 (en) 1999-08-17 2004-06-22 Nec Corporation Packet scheduling device
US20040123277A1 (en) 2002-12-18 2004-06-24 Schrader Stuart Lyle Method, system and computer product for parsing binary data
US20040122926A1 (en) 2002-12-23 2004-06-24 Microsoft Corporation, Redmond, Washington. Reputation system for web services
US6757706B1 (en) 1999-01-28 2004-06-29 International Business Machines Corporation Method and apparatus for providing responses for requests of off-line clients
US6760775B1 (en) 1999-03-05 2004-07-06 At&T Corp. System, method and apparatus for network service load and reliability management
US6760337B1 (en) 1999-08-17 2004-07-06 Conexant Systems, Inc. Integrated circuit that processes communication packets with scheduler circuitry having multiple priority levels
US20040133605A1 (en) 2002-12-20 2004-07-08 Chang Hyun Sung System and method for authoring multimedia contents description metadata
US20040133606A1 (en) 2003-01-02 2004-07-08 Z-Force Communications, Inc. Directory aggregation for files distributed over a plurality of servers in a switched file system
US20040139355A1 (en) 2002-11-07 2004-07-15 Axel David J. Method and system of accessing a plurality of network elements
US20040141185A1 (en) 2002-11-04 2004-07-22 Hill Henry A. Compensation of refractivity perturbations in an interferometer path
CA2512312A1 (en) 2003-01-02 2004-07-22 Attune Systems, Inc. Metadata based file switch and switched file system
US20040148380A1 (en) 2002-10-28 2004-07-29 Richard Meyer Method and system for dynamic expansion and contraction of nodes in a storage area network
US6772219B1 (en) 1998-09-18 2004-08-03 Kabushiki Kaisha Toshiba Message relaying scheme based on switching in units of flows
US20040151186A1 (en) 2001-08-08 2004-08-05 Katsuaki Akama Server, mobile communication terminal, radio apparatus, communication method in communication system and communication system
US20040153479A1 (en) 2002-11-14 2004-08-05 Mikesell Paul A. Systems and methods for restriping files in a distributed file system
US6775679B2 (en) 2001-03-20 2004-08-10 Emc Corporation Building a meta file system from file system cells
US6775673B2 (en) 2001-12-19 2004-08-10 Hewlett-Packard Development Company, L.P. Logical volume-level migration in a partition-based distributed file system
US6779039B1 (en) 2000-03-31 2004-08-17 Avaya Technology Corp. System and method for routing message traffic using a cluster of routers sharing a single logical IP address distinct from unique IP addresses of the routers
US6781986B1 (en) 1999-06-25 2004-08-24 Nortel Networks Limited Scalable high capacity switch architecture method, apparatus and system
US6782450B2 (en) 2001-12-06 2004-08-24 Raidcore, Inc. File mode RAID subsystem
US20040167967A1 (en) 1998-09-08 2004-08-26 Tenzing Communications, Inc. Communications systems for aircraft
US20040181605A1 (en) 2003-03-13 2004-09-16 Hitachi, Ltd. Method for accessing distributed file system
US6795860B1 (en) 1999-04-05 2004-09-21 Cisco Technology, Inc. System and method for selecting a service with dynamically changing information
US6798777B1 (en) 2000-04-17 2004-09-28 Juniper Networks, Inc. Filtering and route lookup in a switching device
US20040192312A1 (en) 2002-07-16 2004-09-30 Jia-Ru Li Communication system for voice and data with wireless TCP server
US6801960B1 (en) 2000-09-28 2004-10-05 Emc Corporation Switch-based acceleration of computer data storage employing aggregations of disk arrays
US20040199547A1 (en) 2003-04-07 2004-10-07 Marco Winter Database model for hierarchical data formats
US6804542B1 (en) 2000-09-22 2004-10-12 Telefonaktiebolaget Lm Ericsson (Publ) Sleep modes in peer-to-peer communications
US20040215665A1 (en) 2002-01-09 2004-10-28 Edgar David A. System, method, and computer program product for providing accelerated and secure wireless data transmission over the internet
US20040213156A1 (en) 2003-04-25 2004-10-28 Alcatel Ip Networks, Inc. Assigning packet queue priority
US6816901B1 (en) 1999-05-06 2004-11-09 Cisco Technology, Inc. Proxy session count limitation
US20040236798A1 (en) 2001-09-11 2004-11-25 Sudhir Srinivasan Migration of control in a distributed segmented file system
US20040236826A1 (en) 2003-05-19 2004-11-25 Michael Harville Combination case for service location management of media services
US6826613B1 (en) 2000-03-15 2004-11-30 3Com Corporation Virtually addressing storage devices through a switch
US6829238B2 (en) 2000-02-28 2004-12-07 Fujitsu Limited IP router device having a TCP termination function and a medium thereof
US20040264472A1 (en) 2003-06-27 2004-12-30 Oliver Neal C. Method and system for open-loop congestion control in a system fabric
US20040267920A1 (en) 2003-06-30 2004-12-30 Aamer Hydrie Flexible network load balancing
US20040267948A1 (en) 2003-06-27 2004-12-30 Oliver Neal C. Method and system for a network node for attachment to switch fabrics
US20040264481A1 (en) 2003-06-30 2004-12-30 Darling Christopher L. Network load balancing with traffic routing
US20040268358A1 (en) 2003-06-30 2004-12-30 Microsoft Corporation Network load balancing with host status information
US6839761B2 (en) 2001-04-19 2005-01-04 Microsoft Corporation Methods and systems for authentication through multiple proxy servers that require different authentication data
US6839850B1 (en) 1999-03-04 2005-01-04 Prc, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US20050004887A1 (en) 2003-07-02 2005-01-06 Nec Corporation Policy processing system and method
JP2005010913A (en) 2003-06-17 2005-01-13 Toshiba Corp Session management method
US6847970B2 (en) 2002-09-11 2005-01-25 International Business Machines Corporation Methods and apparatus for managing dependencies in distributed systems
US6847959B1 (en) 2000-01-05 2005-01-25 Apple Computer, Inc. Universal interface for retrieval of information in a computer system
US20050021736A1 (en) 2003-01-07 2005-01-27 International Business Machines Corporation Method and system for monitoring performance of distributed applications
US20050021703A1 (en) 2003-06-04 2005-01-27 Cherry Darrel D. Systems and methods for automatically configuring a client for remote use of a network-based service
US6850997B1 (en) 2000-09-27 2005-02-01 International Business Machines Corporation System, method, and program for determining the availability of paths to a device
US20050027841A1 (en) 2003-08-01 2005-02-03 Rolfe Edward G. Programmable remote device management system for locally or remotely controlling and/or configuring a communication network switch
US20050027869A1 (en) 2003-07-31 2005-02-03 International Business Machines Corporation Method, system and program product for asynchronously processing requests
US20050028010A1 (en) 2003-07-29 2005-02-03 International Business Machines Corporation System and method for addressing denial of service virus attacks
US20050044158A1 (en) 2000-05-04 2005-02-24 Bellsouth Intellectual Property Corporation Data compression in electronic communications
US20050044213A1 (en) 2003-05-26 2005-02-24 Emiko Kobayashi Network traffic measurement system
US20050050107A1 (en) 2003-09-03 2005-03-03 Mane Virendra M. Using a file for associating the file with a tree quota in a file server
US6865593B1 (en) 2000-04-12 2005-03-08 Webcollege, Inc. Dynamic integration of web sites
US20050052440A1 (en) 2003-08-22 2005-03-10 Samsung Electronics Co., Ltd. Apparatus for and method of processing display signal
US20050055435A1 (en) 2003-06-30 2005-03-10 Abolade Gbadegesin Network load balancing with connection manipulation
US6868447B1 (en) 2000-05-09 2005-03-15 Sun Microsystems, Inc. Mechanism and apparatus for returning results of services in a distributed computing environment
US6868082B1 (en) 1999-08-30 2005-03-15 International Business Machines Corporation Network processor interface for building scalable switching systems
US6871221B1 (en) 2000-01-21 2005-03-22 Scriptlogic Corporation Method and apparatus to manage network client logon scripts using a graphical management and administration tool
US6876629B2 (en) 1999-02-04 2005-04-05 Uortel Networks Limited Rate-controlled multi-class high-capacity packet switch
US6876654B1 (en) 1998-04-10 2005-04-05 Intel Corporation Method and apparatus for multiprotocol switching and routing
US6880017B1 (en) 2000-03-20 2005-04-12 International Business Machines Corporation System and method for providing an adaptive streaming flow control mechanism between the TCP and IP layers of the TCP/IP suite of protocols
US20050078604A1 (en) 2003-10-08 2005-04-14 Wai Yim Connectionless TCP/IP data exchange
US6883137B1 (en) 2000-04-17 2005-04-19 International Business Machines Corporation System and method for schema-driven compression of extensible mark-up language (XML) documents
US20050091214A1 (en) 2003-10-24 2005-04-28 Mircrosoft Corporation Internal object protection from application programs
US6888836B1 (en) 1999-05-26 2005-05-03 Hewlett-Packard Development Company, L.P. Method for allocating web sites on a web hosting cluster
US20050108575A1 (en) 2003-11-18 2005-05-19 Yung Chong M. Apparatus, system, and method for faciliating authenticated communication between authentication realms
US20050114701A1 (en) 2003-11-21 2005-05-26 International Business Machines Corporation Federated identity management within a distributed portal server
US20050114291A1 (en) 2003-11-25 2005-05-26 International Business Machines Corporation System, method, and service for federating and optionally migrating a local file system into a distributed file system while preserving local access to existing data
US20050117589A1 (en) 2003-08-13 2005-06-02 Cesar Douady Method and device for managing priority during the transmission of a message
US20050125195A1 (en) 2001-12-21 2005-06-09 Juergen Brendel Method, apparatus and sofware for network traffic management
US20050122977A1 (en) 2003-12-05 2005-06-09 Microsoft Corporation Efficient download mechanism for devices with limited local storage
US6907037B2 (en) 2000-05-30 2005-06-14 Hitachi, Ltd. Multicast routing method and an apparatus for routing a multicast packet
US6914881B1 (en) 2000-11-28 2005-07-05 Nortel Networks Ltd Prioritized continuous-deficit round robin scheduling
US20050154837A1 (en) 2004-01-12 2005-07-14 International Business Machines Corporation Method and apparatus for managing caching of data on a client
US20050165656A1 (en) 2004-01-27 2005-07-28 Robert Frederick Providing a marketplace for web services
US6928082B2 (en) 2001-03-28 2005-08-09 Innomedia Pte Ltd System and method for determining a connectionless communication path for communicating audio data through an address and port translation device
US20050175013A1 (en) 2003-02-24 2005-08-11 Jean-Francois Le Pennec Method for transmitting high-priority packets in an IP transmission network
US6934706B1 (en) 2002-03-22 2005-08-23 International Business Machines Corporation Centralized mapping of security credentials for database access operations
US20050188423A1 (en) 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for monitoring user behavior for a server application
US20050188220A1 (en) 2002-07-01 2005-08-25 Mikael Nilsson Arrangement and a method relating to protection of end user data
US20050187866A1 (en) 1999-11-16 2005-08-25 Lee Andre S. Method and system for executing financial transactions via a communication medium
US6938059B2 (en) 1998-06-30 2005-08-30 Emc Corporation System for determining the mapping of logical objects in a data storage system
US6938039B1 (en) 2000-06-30 2005-08-30 Emc Corporation Concurrent file across at a target file server during migration of file systems between file servers using a network file system access protocol
US20050189501A1 (en) 2004-01-23 2005-09-01 Mitsugu Sato Charged particle system and a method for measuring image magnification
US20050198234A1 (en) 2004-02-20 2005-09-08 Gteko, Ltd. System and unified setting interface for configuring network manageable devices
US20050198310A1 (en) 2004-03-08 2005-09-08 Samsung Electronics Co., Ltd. Method of communicating with server having flexible address
US6947985B2 (en) 2001-12-05 2005-09-20 Websense, Inc. Filtering techniques for managing access to internet sites or other software applications
US6950434B1 (en) 1999-12-07 2005-09-27 Advanced Micro Devices, Inc. Arrangement for searching packet policies using multi-key hash searches in a network switch
US20050213587A1 (en) 2004-03-26 2005-09-29 Samsung Electronics Co., Ltd. Apparatus and method for scheduling packets in a wireless communication system
US6957272B2 (en) 2000-05-24 2005-10-18 Alcatel Internetworking (Pe), Inc. Stackable lookup engines
US20050234928A1 (en) 2004-03-23 2005-10-20 Grand Central Communications, Inc. Synchronous interface to asynchronous processes
US6959373B2 (en) 2001-12-10 2005-10-25 Incipient, Inc. Dynamic and variable length extents
US6959394B1 (en) 2000-09-29 2005-10-25 Intel Corporation Splitting knowledge of a password
US20050240664A1 (en) 2004-02-13 2005-10-27 Hon Hai Precision Industry Co., Ltd. System and method for configuring and managing a network device
US6961815B2 (en) 2002-12-05 2005-11-01 International Business Machines Corporation Multiple disk data storage system for reducing power consumption
US20050246393A1 (en) 2000-03-03 2005-11-03 Intel Corporation Distributed storage cluster architecture
US20050256806A1 (en) 2004-05-12 2005-11-17 Alan Tien Method and system to facilitate securely processing a payment for an online transaction
US20050262238A1 (en) 2004-05-07 2005-11-24 Zeus Technology Limited Tolerating failure of traffic management systems
US6970924B1 (en) 1999-02-23 2005-11-29 Visual Networks, Inc. Methods and apparatus for monitoring end-user experience in a distributed network
US6973455B1 (en) 1999-03-03 2005-12-06 Emc Corporation File server system providing direct data sharing between clients with a server acting as an arbiter and coordinator
US6973549B1 (en) 2001-12-10 2005-12-06 Incipient, Inc. Locking technique for control and synchronization
US6973490B1 (en) 1999-06-23 2005-12-06 Savvis Communications Corp. Method and system for object-level web performance and analysis
US6975592B1 (en) 2000-11-22 2005-12-13 Nortel Networks Limited Configurable rule-engine for layer-7 and traffic characteristic-based classification
US20050277430A1 (en) 2004-05-11 2005-12-15 Armin Meisl Intelligent mobile messaging and communication traffic Hub (iHub)
US20050289109A1 (en) 2004-06-25 2005-12-29 Yan Arrouye Methods and systems for managing data
US20050289111A1 (en) 2004-06-25 2005-12-29 Tribble Guy L Method and apparatus for processing metadata
US6985936B2 (en) 2001-09-27 2006-01-10 International Business Machines Corporation Addressing the name space mismatch between content servers and content caching systems
US6986015B2 (en) 2001-12-10 2006-01-10 Incipient, Inc. Fast path caching
US6985956B2 (en) 2000-11-02 2006-01-10 Sun Microsystems, Inc. Switching system
US6986040B1 (en) 2000-11-03 2006-01-10 Citrix Systems, Inc. System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US20060010502A1 (en) 2003-11-26 2006-01-12 Hitachi, Ltd. Method and apparatus for setting access restriction information
US6987763B2 (en) 2000-05-04 2006-01-17 Comverse Ltd. Load balancing
US6990547B2 (en) 2001-01-29 2006-01-24 Adaptec, Inc. Replacing file system processors by hot swapping
US6990667B2 (en) 2001-01-29 2006-01-24 Adaptec, Inc. Server-independent object positioning for load balancing drives and servers
US6990114B1 (en) 2001-03-26 2006-01-24 Advanced Micro Devices, Inc. System and method for deciding outgoing priority for data frames
US6990074B2 (en) 1998-12-16 2006-01-24 Nortel Networks Limited Method and apparatus for the control of multimedia services in networks
US6996841B2 (en) 2001-04-19 2006-02-07 Microsoft Corporation Negotiating secure connections through a proxy server
US20060031520A1 (en) 2004-05-06 2006-02-09 Motorola, Inc. Allocation of common persistent connections through proxies
US7003564B2 (en) 2001-01-17 2006-02-21 Hewlett-Packard Development Company, L.P. Method and apparatus for customizably calculating and displaying health of a computer network
US7007092B2 (en) 2000-10-05 2006-02-28 Juniper Networks, Inc. Connection management system and method
US20060045096A1 (en) 2004-09-01 2006-03-02 International Business Machines Corporation Method, system, and computer product for controlling input message priority
US20060047785A1 (en) 2004-06-18 2006-03-02 Hon Hai Precision Industry Co., Ltd. System and method for configuring and managing communication devices
US7010553B2 (en) 2002-03-19 2006-03-07 Network Appliance, Inc. System and method for redirecting access to a remote mirrored snapshot
US7013379B1 (en) 2001-12-10 2006-03-14 Incipient, Inc. I/O primitives
US20060059267A1 (en) 2004-09-13 2006-03-16 Nokia Corporation System, method, and device for downloading content using a second transport protocol within a generic content download protocol
US7020699B2 (en) 2001-09-11 2006-03-28 Sun Microsystems, Inc. Test result analyzer in a distributed processing framework system and methods for implementing the same
US7023974B1 (en) 2002-10-31 2006-04-04 America Online, Inc. Compression of electronic communications
US20060075475A1 (en) 2004-10-01 2006-04-06 Grand Central Communications, Inc. Application identity design
US7028182B1 (en) * 1999-02-19 2006-04-11 Nexsys Electronics, Inc. Secure network system and method for transfer of medical information
US20060077902A1 (en) 2004-10-08 2006-04-13 Kannan Naresh K Methods and apparatus for non-intrusive measurement of delay variation of data traffic on communication networks
US7039061B2 (en) 2001-09-25 2006-05-02 Intel Corporation Methods and apparatus for retaining packet order in systems utilizing multiple transmit queues
US20060095573A1 (en) 2004-11-01 2006-05-04 Microsoft Corporation Delayed HTTP response
US20060106882A1 (en) 2002-03-07 2006-05-18 Microsoft Corporation File Availability in Distributed File Storage Systems
US7051112B2 (en) 2001-10-02 2006-05-23 Tropic Networks Inc. System and method for distribution of software
US20060112272A1 (en) 2002-10-17 2006-05-25 Yoshihiro Morioka Packet transmission/reception device
US20060112367A1 (en) 2002-10-24 2006-05-25 Robert Harris Method and system for ranking services in a web services architecture
US20060112151A1 (en) 2002-03-19 2006-05-25 Manley Stephen L System and method for storage of snapshot metadata in a remote file
US20060112176A1 (en) 2000-07-19 2006-05-25 Liu Zaide E Domain name resolution using a distributed DNS network
US7058633B1 (en) 2002-09-09 2006-06-06 Cisco Technology, Inc. System and method for generalized URL-rewriting
US20060129684A1 (en) 2004-11-10 2006-06-15 Chutney Technologies, Inc. Apparatus and method for distributing requests across a cluster of application servers
US20060135198A1 (en) 2004-11-15 2006-06-22 Lg Electronics Inc. Method for managing resources in mobile terminal
US20060140193A1 (en) 2004-12-29 2006-06-29 Nokia Corporation Optimization of a TCP connection
US7072917B2 (en) 2003-04-24 2006-07-04 Neopath Networks, Inc. Extended storage capacity for a network file server
US7076689B2 (en) 2002-10-29 2006-07-11 Brocade Communication Systems, Inc. Use of unique XID range among multiple control processors
US20060156416A1 (en) 2005-01-07 2006-07-13 Huotari Allen J Remote access to local content using transcryption of digital rights management schemes
US20060153201A1 (en) 2005-01-12 2006-07-13 Thomson Licensing Method for assigning a priority to a data transfer in a network, and network node using the method
US7080314B1 (en) 2000-06-16 2006-07-18 Lucent Technologies Inc. Document descriptor extraction method
US20060161577A1 (en) 2005-01-19 2006-07-20 Microsoft Corporation Load balancing based on cache content
US20060167838A1 (en) 2005-01-21 2006-07-27 Z-Force Communications, Inc. File-based hybrid file storage scheme supporting multiple file switches
US20060171365A1 (en) 2005-02-02 2006-08-03 Utstarcom, Inc. Method and apparatus for L2TP dialout and tunnel switching
US7089491B2 (en) 2002-05-03 2006-08-08 Microsoft Corporation System and method for enhancing XML schemas
US7089286B1 (en) 2000-05-04 2006-08-08 Bellsouth Intellectual Property Corporation Method and apparatus for compressing attachments to electronic mail communications for transmission
US7088726B1 (en) 1996-07-04 2006-08-08 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US20060179261A1 (en) 2003-04-11 2006-08-10 Vijayan Rajan Writable read-only snapshots
US20060184589A1 (en) 2000-06-21 2006-08-17 Microsoft Corporation Linked Value Replication
US20060190496A1 (en) 2005-02-21 2006-08-24 Canon Kabushiki Kaisha Data transmission device and method for controlling the same and image reading apparatus using the same
WO2006091040A1 (en) 2005-02-24 2006-08-31 Lg Electronics Inc. Layer structure of network control protocol and interface method
US20060200470A1 (en) 2005-03-03 2006-09-07 Z-Force Communications, Inc. System and method for managing small-size files in an aggregated file system
US7111115B2 (en) 1997-12-24 2006-09-19 Avid Technology, Inc. Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner
US20060212746A1 (en) 2005-03-21 2006-09-21 Augustine Amegadzie Selection of migration methods including partial read restore in distributed storage management
US20060209853A1 (en) 2005-03-16 2006-09-21 Minoru Hidaka Packet transfer device and transfer control method thereof
US7113993B1 (en) 2001-06-20 2006-09-26 Microstrategy, Inc. Technique for handling server session requests in a system having a plurality of servers
US7113962B1 (en) 1999-06-22 2006-09-26 F5 Networks, Inc. Method and system for automatically updating content stored on servers connected by a network
US7113996B2 (en) 2000-07-21 2006-09-26 Sandy Craig Kronenberg Method and system for secured transport and storage of data on a network
US20060224687A1 (en) 2005-03-31 2006-10-05 Popkin Laird A Method and apparatus for offline cooperative file distribution using cache nodes
US7120128B2 (en) 1998-10-23 2006-10-10 Brocade Communications Systems, Inc. Method and system for creating and implementing zones within a fibre channel system
US7120746B2 (en) 2002-09-09 2006-10-10 International Business Machines Corporation Technique for data transfer
US20060230265A1 (en) 2005-04-08 2006-10-12 Ravi Krishna Cookie-based acceleration of an authentication protocol
US20060230148A1 (en) 2005-04-06 2006-10-12 John Forecast TCP forwarding of client requests of high-level file and storage access protocols in a network file server system
US20060233106A1 (en) 2005-04-14 2006-10-19 Microsoft Corporation Stateless, affinity-preserving load balancing
US7127556B2 (en) 1998-06-30 2006-10-24 Emc Corporation Method and apparatus for initializing logical objects in a data storage system
US20060242300A1 (en) 2005-04-25 2006-10-26 Hitachi, Ltd. Load balancing server and system
US20060242179A1 (en) 2002-08-09 2006-10-26 Chen Raymond C System and method for restoring a virtual disk from a snapshot
US7133863B2 (en) 2000-12-28 2006-11-07 Intel Corporation Method and apparatus to search for information
US7133967B2 (en) 2003-05-09 2006-11-07 International Business Machines Corporation Storage system, controller, control method and program product therefor
US7133944B2 (en) 2003-02-04 2006-11-07 Samsung Electronics, Co., Ltd. Media access controller with power-save mode
US20060259320A1 (en) 2001-08-30 2006-11-16 Accenture Global Services Gmbh Transitive trust network
US20060259949A1 (en) 1999-05-12 2006-11-16 Softricity, Inc. Policy based composite file system and method
US7139792B1 (en) 2000-09-29 2006-11-21 Intel Corporation Mechanism for locking client requests to a particular server
US20060271598A1 (en) 2004-04-23 2006-11-30 Wong Thomas K Customizing a namespace in a decentralized storage environment
US20060268692A1 (en) 2005-05-31 2006-11-30 Bellsouth Intellectual Property Corp. Transmission of electronic packets of information of varying priorities over network transports while accounting for transmission delays
US7146524B2 (en) 2001-08-03 2006-12-05 Isilon Systems, Inc. Systems and methods for providing a distributed file system incorporating a virtual hot spare
US20060277225A1 (en) 2005-06-07 2006-12-07 Mark Timothy W Converting file system metadata structure while the file system remains available
US20060282442A1 (en) 2005-04-27 2006-12-14 Canon Kabushiki Kaisha Method of learning associations between documents and data sets
US20060282471A1 (en) 2005-06-13 2006-12-14 Mark Timothy W Error checking file system metadata while the file system remains available
US20060282461A1 (en) 2005-06-10 2006-12-14 Microsoft Corporation Object virtualization
US7152184B2 (en) 2001-11-22 2006-12-19 Kabushiki Kaisha Toshiba Storage device, backup method and computer program code of this storage device
US20060288413A1 (en) 2005-06-17 2006-12-21 Fujitsu Limited Intrusion detection and prevention system
US7155466B2 (en) 2003-10-27 2006-12-26 Archivas, Inc. Policy-based management of a redundant array of independent nodes
US20070005807A1 (en) 2005-06-29 2007-01-04 Symbian Software Limited Delta code messaging
US20070006293A1 (en) 2005-06-30 2007-01-04 Santosh Balakrishnan Multi-pattern packet content inspection mechanisms employing tagged values
US7162529B2 (en) 2002-05-30 2007-01-09 Hitachi, Ltd. System using mobile proxy for intercepting mobile IP message and performing protocol translation to support multiple communication protocols between mobile networks
US20070016613A1 (en) 2005-07-15 2007-01-18 Stefano Foresti System and method for data transport
US20070016662A1 (en) 2005-07-13 2007-01-18 Desai Aditya A Method and system for dynamically rebalancing client sessions within a cluster of servers connected to a network
US7167821B2 (en) 2000-06-06 2007-01-23 Microsoft Corporation Evaluating hardware models having resource contention
US7171496B2 (en) 2002-09-24 2007-01-30 Sharp Kabushiki Kaisha Data bus width conversion apparatus and data processing apparatus
US20070024919A1 (en) 2005-06-29 2007-02-01 Wong Chi M Parallel filesystem traversal for transparent mirroring of directories and files
US20070028068A1 (en) 2005-07-29 2007-02-01 International Business Machines Corporation System and method for managing resources in a distributed storage system
US20070027935A1 (en) 2005-07-28 2007-02-01 Haselton William R Backing up source files in their native file formats to a target storage
US20070027929A1 (en) 2005-08-01 2007-02-01 Whelan Gary J System, method, and/or computer program product for a file system interface
US7173929B1 (en) 2001-12-10 2007-02-06 Incipient, Inc. Fast path for performing data operations
US7185359B2 (en) 2001-12-21 2007-02-27 Microsoft Corporation Authentication and authorization across autonomous network systems
US7191163B2 (en) 2002-04-19 2007-03-13 Computer Associates Think, Inc. System and method for providing inferencing services
US20070058670A1 (en) 2005-08-08 2007-03-15 American Megatrends, Inc. UDP to TCP bridge
US7194579B2 (en) 2004-04-26 2007-03-20 Sun Microsystems, Inc. Sparse multi-component files
US20070064661A1 (en) 2005-09-21 2007-03-22 Kapil Sood Method, apparatus and system for maintaining mobility resistant IP tunnels using a mobile router
US20070083646A1 (en) 2005-10-11 2007-04-12 Integrated Device Technology, Inc. Switching circuit implementing variable string matching
US20070088702A1 (en) 2005-10-03 2007-04-19 Fridella Stephen A Intelligent network client for multi-protocol namespace redirection
US20070088822A1 (en) 1995-11-03 2007-04-19 Cisco Technology, Inc. System for Distributing Load Over Multiple Servers at an Internet Site
US7209759B1 (en) 2005-06-23 2007-04-24 Cisco Technology, Inc. Method and system for customizing distributed short message routing
US20070107048A1 (en) 2005-10-11 2007-05-10 David Halls Systems and Methods for Facilitating Distributed Authentication
US20070106796A1 (en) 2005-11-09 2007-05-10 Yutaka Kudo Arbitration apparatus for allocating computer resource and arbitration method therefor
US20070118879A1 (en) 2005-09-20 2007-05-24 Lg Electronics Inc. Security protocol model for ubiquitous networks
US20070124502A1 (en) 2005-11-28 2007-05-31 Huawei Technologies Co., Ltd. Script language based network device configuration management system and method
US20070124806A1 (en) 2005-11-28 2007-05-31 Imperva, Inc. Techniques for tracking actual users in web application security systems
US7228359B1 (en) 2002-02-12 2007-06-05 Cisco Technology, Inc. Methods and apparatus for providing domain name service based on a client identifier
US20070130255A1 (en) 2003-04-17 2007-06-07 Lionel Wolovitz Data access, replication or communication system comprising a distributed software application
US20070136308A1 (en) 2005-09-30 2007-06-14 Panagiotis Tsirigotis Accumulating access frequency and file attributes for supporting policy based storage management
US20070136312A1 (en) 2005-12-12 2007-06-14 Imperva, Inc System and method for correlating between http requests and sql queries
US7234074B2 (en) 2003-12-17 2007-06-19 International Business Machines Corporation Multiple disk data storage system for reducing power consumption
US7236491B2 (en) 2000-11-30 2007-06-26 Industrial Technology Research Institute Method and apparatus for scheduling for packet-switched networks
US7240100B1 (en) 2000-04-14 2007-07-03 Akamai Technologies, Inc. Content delivery network (CDN) content server request handling mechanism with metadata framework support
US20070162891A1 (en) 2006-01-12 2007-07-12 International Business Machines Corporation Graphical aid for generating object setup scripts
US20070168320A1 (en) 2003-11-26 2007-07-19 Dhrubajyoti Borthakur System and method for detecting file content similarity within a file system
US20070174491A1 (en) 1999-01-05 2007-07-26 Still David N Selectively forced redirection of network traffic
US20070208748A1 (en) 2006-02-22 2007-09-06 Microsoft Corporation Reliable, efficient peer-to-peer storage
US20070209075A1 (en) 2006-03-04 2007-09-06 Coffman Thayne R Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data
US20070214503A1 (en) 2006-03-08 2007-09-13 Imperva, Inc. Correlation engine for detecting network attacks and detection method
US20070220598A1 (en) 2006-03-06 2007-09-20 Cisco Systems, Inc. Proactive credential distribution
US20070233826A1 (en) 2000-12-06 2007-10-04 Tindal Glen D System and method for configuration, management and monitoring of network resources
US20070233809A1 (en) 2001-04-20 2007-10-04 Egenera, Inc. Reconfigurable, virtual processing system, cluster, network and method
US7280971B1 (en) 2000-06-09 2007-10-09 At&T Bls Intellectual Property, Inc. Method and system for server-based error processing in support of legacy-based usage and billing systems
US7284150B2 (en) 2004-09-22 2007-10-16 International Business Machines Corporation System and method for reliably storing data and providing efficient incremental backup and asynchronous mirroring by preferentially handling new data
US7287082B1 (en) 2003-03-03 2007-10-23 Cisco Technology, Inc. System using idle connection metric indicating a value based on connection characteristic for performing connection drop sequence
US7293133B1 (en) 2003-12-31 2007-11-06 Veritas Operating Corporation Performing operations without requiring split mirrors in a multi-class file system
US7292541B1 (en) 2004-01-28 2007-11-06 Novell, Inc. Methods and systems for unnumbered network link discovery
US7293099B1 (en) 1998-09-29 2007-11-06 Sun Microsystems, Inc. Heterogeneous network file access
US7295827B2 (en) 2004-03-31 2007-11-13 Intel Corporation Mobile station dynamic power saving control
US7296263B1 (en) 2002-12-12 2007-11-13 F5 Networks, Inc. Method and system for performing operations on data using XML streams
US7299491B2 (en) * 2003-04-30 2007-11-20 Microsoft Corporation Authenticated domain name resolution
US7305480B2 (en) 2001-04-18 2007-12-04 Hitachi, Ltd. Method and system for persistent translation between protocols
US7308703B2 (en) 2002-12-18 2007-12-11 Novell, Inc. Protection of data accessible by a mobile device
US7308475B1 (en) 2003-05-06 2007-12-11 F5 Networks, Inc. Method and system for accessing network services
US7308709B1 (en) 2000-04-21 2007-12-11 Microsoft Corporation System and method for managing and authenticating services via service principal names
US7310339B1 (en) 1999-03-31 2007-12-18 British Telecommunications Public Limited Company Packet messaging method and apparatus
US20070297410A1 (en) 2006-06-23 2007-12-27 Seung Yong Yoon Real-time stateful packet inspection method and apparatus
US20070297551A1 (en) 2006-06-27 2007-12-27 Samsung Electronics Co., Ltd. Deskewing method and apparatus, and data reception apparatus using the deskewing method and apparatus
US7315543B2 (en) 2003-05-19 2008-01-01 Hitachi Communications Technologies, Ltd. Apparatus and method for data communication on packet-switching network
US20080004022A1 (en) 2006-06-28 2008-01-03 Telefonaktiebolaget L M Ericsson (Publ) Transmission Parameter Negotiation after Packet-Switched Handover
US20080010372A1 (en) 2003-10-01 2008-01-10 Robert Khedouri Audio visual player apparatus and system and method of content distribution using the same
US7321926B1 (en) 2002-02-11 2008-01-22 Extreme Networks Method of and system for allocating resources to resource requests
US20080022059A1 (en) 2006-07-21 2008-01-24 Zimmerer Peter K Sequencing transactions and operations
US7324533B1 (en) 2003-02-25 2008-01-29 Cisco Technology, Inc. Using modem profiles to improve connectivity, connect timing, and compression performance on a modem relay (MR) gateway
US20080025297A1 (en) 2006-07-28 2008-01-31 International Business Machines Corporation Facilitating use of generic addresses by network applications of virtual servers
US7328009B2 (en) 2002-09-26 2008-02-05 Hitachi, Ltd. Method and apparatus for mobile communication utilizing load balancing
US7328281B2 (en) 2002-05-30 2008-02-05 Hitachi, Ltd. Address translation equipment, terminal equipment and mobile communication method
US20080034136A1 (en) 2005-07-14 2008-02-07 Jonas Ulenas Method and apparatus for protocol and code converter
US7333999B1 (en) 2003-10-30 2008-02-19 Arcsight, Inc. Expression editor
US20080046432A1 (en) 2006-08-18 2008-02-21 Anderson Robert J Systems and methods for a snapshot of data
US7343413B2 (en) 2000-03-21 2008-03-11 F5 Networks, Inc. Method and system for optimizing a network by independently scaling control segments and data flow
US7343398B1 (en) 2002-09-04 2008-03-11 Packeteer, Inc. Methods, apparatuses and systems for transparently intermediating network traffic over connection-based authentication protocols
US7346664B2 (en) 2003-04-24 2008-03-18 Neopath Networks, Inc. Transparent file migration using namespace replication
US20080070575A1 (en) 2006-09-15 2008-03-20 Holger Claussen Method of administering call handover between cells in a communications system
US20080072303A1 (en) 2006-09-14 2008-03-20 Schlumberger Technology Corporation Method and system for one time password based authentication and integrated remote access
US7349391B2 (en) 1999-03-19 2008-03-25 F5 Networks, Inc. Tunneling between a bus and a network
US20080104443A1 (en) 2006-10-30 2008-05-01 Hiroaki Akutsu Information system, data transfer method and data protection method
US20080120370A1 (en) 2006-11-22 2008-05-22 Brian Chan Virtual Meeting Server Discovery
US7383570B2 (en) 2002-04-25 2008-06-03 Intertrust Technologies, Corp. Secure authentication systems and methods
US7383288B2 (en) 2001-01-11 2008-06-03 Attune Systems, Inc. Metadata based file switch and switched file system
US20080134311A1 (en) 2006-12-01 2008-06-05 Microsoft Corporation Authentication delegation based on re-verification of cryptographic evidence
US20080133518A1 (en) 2005-07-01 2008-06-05 Harsh Kapoor Systems and methods for processing data flows
US7385989B2 (en) 1996-07-04 2008-06-10 Hitachi, Ltd. Packet communication method and apparatus and a recording medium storing a packet communication program
US20080137659A1 (en) 2006-12-11 2008-06-12 Eric Michel Levy-Abegnoli Secured IPv6 traffic preemption
US20080148340A1 (en) 2006-10-31 2008-06-19 Mci, Llc. Method and system for providing network enforced access control
US7394804B2 (en) 2003-01-22 2008-07-01 Hitachi, Ltd. Message conversion server and IP telephone
US20080159145A1 (en) 2006-12-29 2008-07-03 Raman Muthukrishnan Weighted bandwidth switching device
US7398552B2 (en) 2002-01-28 2008-07-08 Hughes Network Systems, Llc Method and system for integrating performance enhancing functions in a virtual private network (VPN)
US7401220B2 (en) 2001-03-21 2008-07-15 Microsoft Corporation On-disk file format for a serverless distributed file system
US7403520B2 (en) 2000-07-21 2008-07-22 Hitachi, Ltd. Multicast routing method and apparatus for routing multicast packet
US20080178278A1 (en) 2007-01-22 2008-07-24 Doron Grinstein Providing A Generic Gateway For Accessing Protected Resources
US7406484B1 (en) 2000-09-12 2008-07-29 Tbrix, Inc. Storage allocation in a distributed segmented file system
US7409440B1 (en) 2002-12-12 2008-08-05 F5 Net Works, Inc. User defined data items
US7415488B1 (en) 2004-12-31 2008-08-19 Symantec Operating Corporation System and method for redundant storage consistency recovery
US20080201599A1 (en) 2005-02-11 2008-08-21 Ferraiolo Frank D Combined alignment scrambler function for elastic interface
US20080208933A1 (en) 2006-04-20 2008-08-28 Microsoft Corporation Multi-client cluster-based backup and restore
US20080209073A1 (en) 2005-07-22 2008-08-28 International Business Machines Corporation Adaptive Session Compression Management Method, Compression Manager and Session Management
US20080205613A1 (en) 2007-02-26 2008-08-28 Service Bureau Intetel S.A. Updating routing patterns in an enterprise network
US20080205415A1 (en) 2007-02-28 2008-08-28 Morales Henry N Jerez Access, Connectivity and Interoperability for Devices and Services
US20080222646A1 (en) 2007-03-06 2008-09-11 Lev Sigal Preemptive neural network database load balancer
US20080229415A1 (en) 2005-07-01 2008-09-18 Harsh Kapoor Systems and methods for processing data flows
US20080225710A1 (en) 2007-03-12 2008-09-18 Murali Raja Systems and Methods for Load Balancing Based on User Selected Metrics
GB2448071A (en) 2007-03-30 2008-10-01 Symantec Corp Associating a query with an application user
US20080243769A1 (en) 2007-03-30 2008-10-02 Symantec Corporation System and method for exporting data directly from deduplication storage to non-deduplication storage
US7437478B2 (en) 2004-07-12 2008-10-14 Hitachi, Ltd. Priority control device
US20080256224A1 (en) 2007-02-22 2008-10-16 Tadashi Kaji Data communication system and session management server
US20080253395A1 (en) 2002-06-11 2008-10-16 Pandya Ashish A Tcp/ip processor and engine using rdma
US7440982B2 (en) 2003-11-13 2008-10-21 Commvault Systems, Inc. System and method for stored data archive verification
US7441429B1 (en) 2006-09-28 2008-10-28 Narus, Inc. SIP-based VoIP traffic behavior profiling
US20080270578A1 (en) 2006-01-13 2008-10-30 Huawei Technologies Co., Ltd. Method, Device And Data Download System For Controlling Effectiveness Of A Download Transaction
US20080271132A1 (en) 2005-02-18 2008-10-30 Telefonaktiebolaget Lm Ericsson (Publ) Host Identity Protocol Method and Apparatus
WO2008130983A1 (en) 2007-04-16 2008-10-30 Attune Systems, Inc. File aggregation in a switched file system
US20080282047A1 (en) 2007-05-08 2008-11-13 Hitachi, Ltd. Methods and apparatus to backup and restore data for virtualized storage area
US7454480B2 (en) 2000-08-11 2008-11-18 Napster, Inc. System and method for optimizing access to information in peer-to-peer computer networks
US20080288661A1 (en) 2007-05-16 2008-11-20 Michael Galles Method and system to map virtual i/o devices and resources to a standard i/o bus
WO2008147973A2 (en) 2007-05-25 2008-12-04 Attune Systems, Inc. Remote file virtualization in a switched file system
US20080301760A1 (en) 2005-12-29 2008-12-04 Blue Jungle Enforcing Universal Access Control in an Information Management System
US20080304457A1 (en) 2007-06-08 2008-12-11 Pascal Thubert Secure mobile IPv6 registration
NZ566291A (en) 2008-02-27 2008-12-24 Actionthis Ltd Methods and devices for post processing rendered web pages and handling requests of post processed web pages
US20080320093A1 (en) 2007-06-20 2008-12-25 Goolara, Llc Controlling the sending of electronic mail
US20090007162A1 (en) 2007-06-29 2009-01-01 Microsoft Corporation Flexible namespace prioritization
US7475241B2 (en) 2002-11-22 2009-01-06 Cisco Technology, Inc. Methods and apparatus for dynamic session key generation and rekeying in mobile IP
US7477796B2 (en) 2004-04-09 2009-01-13 Nokia Corporation Method for preparing compressed image data file, image data compression device, and photographic device
US20090028337A1 (en) 2007-07-23 2009-01-29 Savi Technology, Inc. Method and Apparatus for Providing Security in a Radio Frequency Identification System
US20090037975A1 (en) 2007-07-30 2009-02-05 Ishikawa Mark M System and Method for Authenticating Content
US7490162B1 (en) 2002-05-15 2009-02-10 F5 Networks, Inc. Method and system for forwarding messages received at a traffic manager
US20090041230A1 (en) 2007-08-08 2009-02-12 Palm, Inc. Mobile Client Device Driven Data Backup
US20090049230A1 (en) 2007-08-17 2009-02-19 Pandya Ashish A FSA Context Switch Architecture for Programmable Intelligent Search Memory
US20090055607A1 (en) 2007-08-21 2009-02-26 Schack Darren P Systems and methods for adaptive copy on write
US20090070617A1 (en) 2007-09-11 2009-03-12 Arimilli Lakshminarayana B Method for Providing a Cluster-Wide System Clock in a Multi-Tiered Full-Graph Interconnect Architecture
US7505795B1 (en) 2004-07-07 2009-03-17 Advanced Micro Devices, Inc. Power save management with customized range for user configuration and tuning value based upon recent usage
US20090077619A1 (en) 2007-09-19 2009-03-19 Boyce Kevin Gerard Method and system for dynamic protocol decoding and analysis
US7509322B2 (en) 2001-01-11 2009-03-24 F5 Networks, Inc. Aggregated lock management for locking aggregated files in a switched file system
US7512673B2 (en) 2001-01-11 2009-03-31 Attune Systems, Inc. Rule based aggregation of files and transactions in a switched file system
US20090089344A1 (en) 2007-09-28 2009-04-02 Emc Corporation Network accessed storage files system query/set proxy service for a storage virtualization system
US7516492B1 (en) 2003-10-28 2009-04-07 Rsa Security Inc. Inferring document and content sensitivity from public account accessibility
US20090094610A1 (en) 2007-10-05 2009-04-09 Cisco Technology, Inc. Scalable Resources In A Virtualized Load Balancer
US7519813B1 (en) 2004-08-02 2009-04-14 Network Appliance, Inc. System and method for a sidecar authentication mechanism
US20090100518A1 (en) 2007-09-21 2009-04-16 Kevin Overcash System and method for detecting security defects in applications
US7522581B2 (en) 2006-08-01 2009-04-21 International Business Machines Corporation Overload protection for SIP servers
US20090106263A1 (en) 2007-10-20 2009-04-23 Khalid Atm Shafiqul Systems and methods for folder redirection
US20090106255A1 (en) 2001-01-11 2009-04-23 Attune Systems, Inc. File Aggregation in a Switched File System
US20090103524A1 (en) 2007-10-18 2009-04-23 Srinivas Mantripragada System and method to precisely learn and abstract the positive flow behavior of a unified communication (uc) application and endpoints
US7526541B2 (en) 2003-07-29 2009-04-28 Enterasys Networks, Inc. System and method for dynamic network policy management
WO2009052668A1 (en) 2007-10-22 2009-04-30 Zte Corporation A nat-pt device and a load-sharing method for nat-pt device
US20090119504A1 (en) 2005-08-10 2009-05-07 Riverbed Technology, Inc. Intercepting and split-terminating authenticated communication connections
US20090125955A1 (en) 2007-11-08 2009-05-14 At&T Bls Intellectual Property, Inc Methods, computer program products, and virtual servers for a virtual collaborative environment
US20090125625A1 (en) 2005-09-15 2009-05-14 Jeong-Min Shim Load Balancing Method and Apparatus, and Software Streaming System Using the Same
US20090125532A1 (en) 2007-11-13 2009-05-14 B-Hive Networks, Inc Method and system for correlating front-end and back-end transactions in a data center
US20090132616A1 (en) 2007-10-02 2009-05-21 Richard Winter Archival backup integration
US20090138749A1 (en) 2002-05-15 2009-05-28 Broadcom Corporation Hypertransport/SPI-4 Interface Supporting Configurable Deskewing
JP2009124113A (en) 2007-10-23 2009-06-04 Semiconductor Energy Lab Co Ltd Microcrystalline semiconductor film, thin-film transistor, and display device having thin-film transistor
US20090141891A1 (en) 2001-03-27 2009-06-04 Microsoft Corporation Distributed scalable cryptographic access control
US7558197B1 (en) 2002-01-17 2009-07-07 Juniper Networks, Inc. Dequeuing and congestion control systems and methods
US20090187649A1 (en) 2005-12-27 2009-07-23 France Telecom Server and Method for Managing DNSSEC Requests
US7571168B2 (en) 2005-07-25 2009-08-04 Parascale, Inc. Asynchronous file replication and migration in a storage network
US20090196282A1 (en) 1998-08-19 2009-08-06 Great Links G.B. Limited Liability Company Methods and apparatus for providing quality-of-service guarantees in computer networks
US7574433B2 (en) 2004-10-08 2009-08-11 Paterra, Inc. Classification-expanded indexing and retrieval of classified documents
US20090204705A1 (en) 2007-11-12 2009-08-13 Attune Systems, Inc. On Demand File Virtualization for Server Configuration Management with Limited Interruption
US20090204649A1 (en) 2007-11-12 2009-08-13 Attune Systems, Inc. File Deduplication Using Storage Tiers
US20090204650A1 (en) 2007-11-15 2009-08-13 Attune Systems, Inc. File Deduplication using Copy-on-Write Storage Tiers
US7577141B2 (en) 2006-01-20 2009-08-18 Hitachi Communication Technologies, Ltd. Communication system
US7577723B2 (en) 1998-11-12 2009-08-18 Ricoh Co., Ltd. Method and apparatus for automatic network configuration
US20090210431A1 (en) 2007-11-12 2009-08-20 Attune Systems, Inc. Load Sharing Cluster File Systems
US7580971B1 (en) 2001-01-11 2009-08-25 Oracle International Corporation Method and apparatus for efficient SQL processing in an n-tier architecture
US20090228956A1 (en) 2006-11-20 2009-09-10 Huawei Technologies Co., Ltd. System and charging control method of network convergence policy and charging control architecture
US7590732B2 (en) 2004-10-08 2009-09-15 Telefonaktiebolaget Lm Ericsson (Publ) Enhancement of AAA routing originated from a local access network involving intermediary network preferences
US20090254592A1 (en) 2007-11-12 2009-10-08 Attune Systems, Inc. Non-Disruptive File Migration
US20090265396A1 (en) 2003-08-26 2009-10-22 Tamir Ram Method, system, and program for personal data management using content-based replication
US7610307B2 (en) 2004-11-30 2009-10-27 Microsoft Corporation Method and system of detecting file system namespace changes and restoring consistency
US20090271865A1 (en) 2008-04-23 2009-10-29 Huawei Technologies Co., Ltd. Method and device for detecting flood attacks
US7620733B1 (en) * 2005-03-30 2009-11-17 Cisco Technology, Inc. DNS anti-spoofing using UDP
US20090287935A1 (en) 2006-07-25 2009-11-19 Aull Kenneth W Common access card heterogeneous (cachet) system and method
US7624424B2 (en) 2004-05-21 2009-11-24 Nec Corporation Access control system, access control method, and access control program
US7624109B2 (en) 2004-02-27 2009-11-24 Texas Memory Systems, Inc. Distributed asynchronous ordered replication
US20090300407A1 (en) 2008-05-29 2009-12-03 Sandeep Kamath Systems and methods for load balancing via a plurality of virtual servers upon failover using metrics from a backup virtual server
US20090296624A1 (en) 2007-05-14 2009-12-03 Samsung Electronics Co., Ltd. Method and apparatus for transmitting broadcast, method and apparatus for receiving broadcast
US20090300161A1 (en) 2003-11-20 2009-12-03 F5 Networks, Inc. Method and system for using feedback in accessing network services
US7639883B2 (en) 2006-04-18 2009-12-29 Nokia Corporation Method, device, mobile terminal and computer program product for providing variable compression of data files
US7644137B2 (en) 2004-12-14 2010-01-05 Sap Ag Workload balancing in environments with multiple clusters of application servers
US20100011434A1 (en) 2005-08-19 2010-01-14 Rony Kay Apparatus and method for associating categorization information with network traffic to facilitate application level processing
US20100017846A1 (en) 2007-03-23 2010-01-21 Huawei Technologies Co., Ltd. Service processing method and system, and policy control and charging rules function
US7653699B1 (en) 2003-06-12 2010-01-26 Symantec Operating Corporation System and method for partitioning a file system for enhanced availability and scalability
US20100023582A1 (en) 2006-04-12 2010-01-28 Pedersen Brad J Systems and Methods for Accelerating Delivery of a Computing Environment to a Remote User
US20100036959A1 (en) 2008-08-08 2010-02-11 Microsoft Corporation Secure resource name resolution
US20100034381A1 (en) * 2008-08-08 2010-02-11 Microsoft Corporation Secure resource name resolution using a cache
US7668166B1 (en) 1997-12-23 2010-02-23 Cisco Technology, Inc. Peer-model support for virtual private networks having potentially overlapping addresses
US20100061380A1 (en) 2008-09-05 2010-03-11 Cisco Technology, Inc., A Corporation Of California Load Balancing across Multiple Network Address Translation (NAT) Instances and/or Processors
US20100064001A1 (en) 2007-10-10 2010-03-11 Power Takeoff, L.P. Distributed Processing
US20100071048A1 (en) 2008-09-12 2010-03-18 Microsoft Corporation Service binding
US20100077462A1 (en) 2008-09-24 2010-03-25 Neustar, Inc. Secure domain name system
US7689710B2 (en) 2001-06-12 2010-03-30 Hewlett-Packard Development Company, L.P. Method and system for a front-end modular transmission control protocol (TCP) handoff design in a streams based transmission control protocol/internet protocol (TCP/IP) implementation
US20100115236A1 (en) 2008-10-31 2010-05-06 Cray Inc. Hierarchical shared semaphore registers
US20100122091A1 (en) 2008-11-07 2010-05-13 Yi-Hsiung Huang Access Control System And Method Based On Hierarchical Key, And Authentication Key Exchange Method Thereof
US7725093B2 (en) 2006-03-29 2010-05-25 Intel Corporation Method and apparatus for a power-efficient framework to maintain data synchronization of a mobile personal computer to simulate a connected scenario
US7724657B2 (en) 2004-07-23 2010-05-25 Citrix Systems, Inc. Systems and methods for communicating a lossy protocol via a lossless protocol
US7734603B1 (en) 2006-01-26 2010-06-08 Netapp, Inc. Content addressable storage array element
US20100142382A1 (en) 2008-12-05 2010-06-10 Jungck Peder J Identification of patterns in stateful transactions
US20100150154A1 (en) 2008-12-12 2010-06-17 Canon Kabushiki Kaisha Method for transmitting a multi-channel data stream on a multi-transport tunnel, corresponding computer-readable storage means and tunnel end-points
US20100161774A1 (en) * 2004-12-01 2010-06-24 Yih Huang Self-Cleansing Secure DNS Server
US20100165877A1 (en) 2008-12-30 2010-07-01 Amit Shukla Methods and apparatus for distributed dynamic network provisioning
US20100179984A1 (en) 2009-01-13 2010-07-15 Viasat, Inc. Return-link optimization for file-sharing traffic
US7761597B2 (en) 2001-12-07 2010-07-20 Hitachi, Ltd. Address translator, message processing method and equipment
US7778187B2 (en) 2004-06-29 2010-08-17 Damaka, Inc. System and method for dynamic stability in a peer-to-peer hybrid communications network
US20100211547A1 (en) 2009-02-18 2010-08-19 Hitachi, Ltd. File sharing system, file server, and method for managing files
US20100217890A1 (en) 2009-02-20 2010-08-26 Microsoft Corporation Using server type to obtain network address
US7788335B2 (en) 2001-01-11 2010-08-31 F5 Networks, Inc. Aggregated opportunistic lock and aggregated implicit lock management for locking aggregated files in a switched file system
US20100228813A1 (en) 2009-03-05 2010-09-09 Oki Networks Co., Ltd. Information conversion apparatus, information conversion method, information conversion program and relay device
US7801978B1 (en) 2000-10-18 2010-09-21 Citrix Systems, Inc. Apparatus, method and computer program product for efficiently pooling connections between clients and servers
US20100242092A1 (en) 2009-03-20 2010-09-23 James Harris Systems and methods for selecting an authentication virtual server from a plurality of virtual servers
US20100251330A1 (en) 2009-03-12 2010-09-30 Kroeselberg Dirk Optimized relaying of secure network entry of small base stations and access points
US7808913B2 (en) 2005-04-15 2010-10-05 New Jersey Institute Of Technology Dynamic bandwidth allocation and service differentiation for broadband passive optical networks
US7822939B1 (en) 2007-09-25 2010-10-26 Emc Corporation Data de-duplication using thin provisioning
EP2244418A1 (en) 2008-07-28 2010-10-27 Chengdu Huawei Symantec Technologies Co., Ltd. Database security monitoring method, device and system
US20100274885A1 (en) 2009-04-22 2010-10-28 Microsoft Corporation Proactive load balancing
US7831639B1 (en) 2004-12-22 2010-11-09 Symantec Operating Corporation System and method for providing data protection by using sparse files to represent images of data stored in block devices
US7831662B2 (en) 2003-07-11 2010-11-09 At&T Intellectual Property I, L.P. Multi-user database system and method for resource usage tracking
US20100325277A1 (en) 2009-06-22 2010-12-23 Manikam Muthiah Systems and methods for handling limit parameters for a multi-core system
US20100322250A1 (en) 2009-06-22 2010-12-23 Anil Shetty Systems and methods for distributed hash table in a multi-core system
US20100325264A1 (en) 2009-04-24 2010-12-23 William Crowder Media resource storage and management
US7870154B2 (en) 2007-09-28 2011-01-11 Hitachi, Ltd. Method and apparatus for NAS/CAS unified storage system
US7877511B1 (en) 2003-01-13 2011-01-25 F5 Networks, Inc. Method and apparatus for adaptive services networking
US7885970B2 (en) 2005-01-20 2011-02-08 F5 Networks, Inc. Scalable system for partitioning and accessing metadata over multiple servers
US20110040889A1 (en) 2009-08-11 2011-02-17 Owen John Garrett Managing client requests for data
US20110038377A1 (en) 2009-08-14 2011-02-17 Telefonaktiebolaget L M Ericsson Method and apparatus for providing host node awareness for multiple NAT64 environments
US20110047620A1 (en) 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for server-coupled malware prevention
US20110055921A1 (en) 2009-09-03 2011-03-03 Juniper Networks, Inc. Protecting against distributed network flood attacks
US7908245B2 (en) 2007-03-09 2011-03-15 Fujitsu Limited Database management method and database management apparatus
US7908314B2 (en) 2005-03-23 2011-03-15 Hitachi, Ltd. Method for controlling a management computer
US20110066736A1 (en) 2009-09-16 2011-03-17 International Business Machines Corporation Method and system for establishing connections between nodes in a communication network
US7913053B1 (en) 2005-02-15 2011-03-22 Symantec Operating Corporation System and method for archival of messages in size-limited containers and separate archival of attachments in content addressable storage
US7921211B2 (en) * 1998-10-30 2011-04-05 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US7925908B2 (en) 2006-06-16 2011-04-12 Samsung Electronics Co., Ltd Apparatus and method for controlling slotted mode of several systems using one sleep controller in a hybrid terminal of a mobile communication system
US7930365B2 (en) 2005-02-16 2011-04-19 Cisco Technology, Inc. Method and apparatus to modify network identifiers at data servers
US7933946B2 (en) 2007-06-22 2011-04-26 Microsoft Corporation Detecting data propagation in a distributed system
US7945908B1 (en) 2006-03-31 2011-05-17 Vmware, Inc. Method and system for improving the accuracy of timing and process accounting within virtual machines
US7953701B2 (en) 2003-08-08 2011-05-31 Hitachi, Ltd. Method of controlling total disk usage amount in virtualized and unified network storage system
US7958347B1 (en) 2005-02-04 2011-06-07 F5 Networks, Inc. Methods and apparatus for implementing authentication
US20110154443A1 (en) 2009-12-23 2011-06-23 Ravindranath Thakur Systems and methods for aaa-traffic management information sharing across cores in a multi-core system
US20110153822A1 (en) 2009-12-23 2011-06-23 Roy Rajan Systems and methods for managing preferred client connectivity to servers via multi-core system
US20110154132A1 (en) 2009-12-23 2011-06-23 Gunes Aybay Methods and apparatus for tracking data flow based on flow state values
US20110173295A1 (en) 2005-06-22 2011-07-14 Mark Bakke Offload stack for network, block and file input and output
US7984141B2 (en) 2007-07-16 2011-07-19 Cisco Technology, Inc. Independent load balancing for servers
US20110184733A1 (en) 2010-01-22 2011-07-28 Research In Motion Limited System and method for encoding and decoding pulse indices
US20110208714A1 (en) 2010-02-19 2011-08-25 c/o Microsoft Corporation Large scale search bot detection
US20110211553A1 (en) 2010-02-26 2011-09-01 Telefonaktiebolaget Lm Ericsson Enabling IPV6 Mobility with NAT64
JP2011188071A (en) 2010-03-05 2011-09-22 Nec Corp Intrusion detection/prevention system, client computer, intrusion detection/prevention apparatus and method, and program
US20110246800A1 (en) 2010-03-31 2011-10-06 International Business Machines Corporation Optimizing power management in multicore virtual machine platforms by dynamically variable delay before switching processor cores into a low power state
US20110273984A1 (en) 2002-06-10 2011-11-10 Qualcomm Incorporated Packet Flow Processing in a Communication System
US20110282997A1 (en) 2010-04-01 2011-11-17 Matthew Browning Prince Custom responses for resource unavailable errors
US20110283018A1 (en) 2009-08-14 2011-11-17 Akamai Technologies, Inc. Method and apparatus for correlating nameserver IPv6 and IPv4 addresses
JP2011238263A (en) 2011-06-27 2011-11-24 Canon It Solutions Inc Information processing apparatus, information processing method, and computer program
US8069225B2 (en) 2003-04-14 2011-11-29 Riverbed Technology, Inc. Transparent client-server transaction accelerator
US20110292857A1 (en) 2010-05-27 2011-12-01 Futurewei Technologies, Inc. Network Address Translator 64 for Dual Stack Mobile Internet Protocol Version Six
US20110295924A1 (en) 2010-05-27 2011-12-01 Robert Paul Morris Methods, systems, and computer program products for preventing processing of an http response
US20110307629A1 (en) 2010-06-14 2011-12-15 Telefonaktiebolaget Lm Ericsson Enhancing DS-Lite with Private IPV4 Reachability
US20110321122A1 (en) 2009-03-04 2011-12-29 Koninklijke Philips Electronics N.V. Specifying an access control policy
US20120005372A1 (en) 2010-07-02 2012-01-05 Futurewei Technologies, Inc. Network Address Translation Six to Four for Proxy Mobile Internet Protocol Version Six
US20120016994A1 (en) 2009-03-03 2012-01-19 Hitachi, Ltd. Distributed system
US8103781B1 (en) 2009-05-01 2012-01-24 Google Inc. Mechanism for handling persistent requests from stateless clients
US8107471B2 (en) 2007-06-15 2012-01-31 Hitachi, Ltd. Communication system, server, control apparatus and communication apparatus
US20120039341A1 (en) 1999-03-10 2012-02-16 Aamer Latif Method and apparatus for transferring data between ip network devices and scsi and fibre channel devices over an ip network
US20120041965A1 (en) 2010-08-10 2012-02-16 Verizon Patent And Licensing Inc. Load balancing based on deep packet inspection
US20120047571A1 (en) 2010-08-17 2012-02-23 Richard Jeremy Duncan Systems and methods for detecting preselected query type within a dns query
US20120054497A1 (en) 2009-06-15 2012-03-01 Nokia Siemens Networks Oy Gateway certificate creation and validation
US8130650B2 (en) 2002-06-03 2012-03-06 International Business Machines Corporation Retro flow control for arriving traffic in computer networks
US20120059934A1 (en) 2010-09-08 2012-03-08 Pierre Rafiq Systems and methods for self-loading balancing access gateways
US20120063314A1 (en) 2010-09-14 2012-03-15 Pignataro Carlos M Universal load-balancing tunnel encapsulation
US20120066489A1 (en) 2003-08-08 2012-03-15 Keiko Ogawa Tcp/ip-based communication system and associated methodology providing an enhanced transport layer protocol
US20120071131A1 (en) 2010-09-21 2012-03-22 Radware, Ltd. Method and system for profiling data communication activity of users of mobile devices
US20120101952A1 (en) 2009-01-28 2012-04-26 Raleigh Gregory G System and Method for Providing User Notifications
US20120110210A1 (en) 2009-06-03 2012-05-03 China Mobile Communications Corporation Method and device for communication for host device with ipv4 application
US20120117379A1 (en) 2010-11-04 2012-05-10 F5 Networks, Inc. Methods for handling requests between different resource record types and systems thereof
US8189567B2 (en) 2009-01-29 2012-05-29 Telefonaktiebolaget L M Ericsson (Publ) Method and nodes for registering a terminal
US8199757B2 (en) 2007-09-28 2012-06-12 Interdigital Patent Holdings, Inc. Method and apparatus for layer 2 processing and creation of protocol data units for wireless communications
US8205246B2 (en) 2007-05-10 2012-06-19 Cisco Technology, Inc. User sensitive filtering of network application layer resources
US20120174217A1 (en) 2010-12-30 2012-07-05 Verizon Patent And Licensing Inc. Network security management
US20120191847A1 (en) 2011-01-21 2012-07-26 Petrus Wilhelmus Adrianus Jacobus Maria Nas Methods, systems, and computer readable media for screening diameter messages within a diameter signaling router (dsr) having a distributed message processor architecture
US8239954B2 (en) 2007-05-07 2012-08-07 Microsoft Corporation Access control based on program properties
US8274895B2 (en) 2009-01-26 2012-09-25 Telefonaktiebolaget L M Ericsson (Publ) Dynamic management of network flows
US20120259998A1 (en) 2011-04-11 2012-10-11 Matthew Kaufman System and method for translating network addresses
US8289968B1 (en) 2010-10-27 2012-10-16 Juniper Networks, Inc. Distributed network address translation in computer networks
US20120284296A1 (en) 2011-05-06 2012-11-08 Verizon Patent And Licensing Inc. Database load balancing through dynamic database routing
US8321908B2 (en) 2007-06-15 2012-11-27 Cisco Technology, Inc. Apparatus and method for applying network policy at a network device
US20120311153A1 (en) 2011-05-31 2012-12-06 Morgan Christopher Edwin Systems and methods for detecting resource consumption events over sliding intervals in cloud-based network
US20120317266A1 (en) 2011-06-07 2012-12-13 Research In Motion Limited Application Ratings Based On Performance Metrics
US20130007870A1 (en) 2011-06-28 2013-01-03 The Go Daddy Group, Inc. Systems for bi-directional network traffic malware detection and removal
US20130029726A1 (en) 2011-07-27 2013-01-31 Qualcomm Incorporated System and method for prioritizing requests to a sim
US8379640B2 (en) 2009-06-17 2013-02-19 Alaxala Networks Corporation Internetwork device
US8380854B2 (en) 2000-03-21 2013-02-19 F5 Networks, Inc. Simplified method for processing multiple connections from the same client
US8417817B1 (en) 2010-09-15 2013-04-09 Google Inc. Preventing server overload
US20130091002A1 (en) 2011-10-05 2013-04-11 News America Marketing Properties, LLC. System and method for coupon validation
US20130103805A1 (en) 2011-07-29 2013-04-25 3Crowd Technologies, Inc. Facilitating content accessibility via different communication formats
US20130100815A1 (en) 2011-10-19 2013-04-25 Verizon Patent And Licensing Inc. Optimized network node selection
US20130110939A1 (en) 2009-06-04 2013-05-02 Zte Corporation Multi-Network Multi-Plane Structure Short Message Centre System and Implementation Method Thereof
US8437345B2 (en) 2003-07-09 2013-05-07 Hitachi, Ltd. Terminal and communication system
US20130120168A1 (en) 2011-11-15 2013-05-16 Abhishek Kumar Systems and methods for load balancing and virtual private networking for sms center
US8447970B2 (en) 2010-02-09 2013-05-21 Microsoft Corporation Securing out-of-band messages
US8464265B2 (en) 2006-04-03 2013-06-11 Secure64 Software Method and system for reallocating computational resources using resource reallocation enabling information
US20130151725A1 (en) 2011-12-13 2013-06-13 B Method and System for Handling a Domain Name Service Request
US8468267B2 (en) 2007-12-01 2013-06-18 Alcatel Lucent IMS diameter router with load balancing
US20130166715A1 (en) 2010-09-16 2013-06-27 Zte Corporation Method for obtaining dns and tunnel gateway device
US8477804B2 (en) 2007-03-02 2013-07-02 Hitachi, Ltd. ICMP translator
US8488465B2 (en) 2008-05-08 2013-07-16 Verizon Patent And Licensing Inc. Intercept flow distribution and intercept load balancer
US20130198322A1 (en) 2012-02-01 2013-08-01 Cisco Technology, Inc. System and method to reduce stream start-up delay for adaptive streaming
US20130201999A1 (en) 2010-04-26 2013-08-08 Nokia Corporation Method and Apparatus for Synthesized Address Detection
US20130205035A1 (en) 2010-07-28 2013-08-08 China Mobile Communications Corporation Method and device for network communications
US20130205040A1 (en) 2012-02-08 2013-08-08 Microsoft Corporation Ensuring symmetric routing to private network
US8539224B2 (en) 2009-11-05 2013-09-17 International Business Machines Corporation Obscuring form data through obfuscation
US8566474B2 (en) 2010-06-15 2013-10-22 Tekelec, Inc. Methods, systems, and computer readable media for providing dynamic origination-based routing key registration in a diameter network
US8578050B2 (en) 2010-02-12 2013-11-05 Tekelec, Inc. Methods, systems, and computer readable media for providing peer routing at a diameter node
US20130335010A1 (en) 2012-06-19 2013-12-19 Nuvoton Technology Corporation Connector and control chip
US20130336122A1 (en) 2008-05-08 2013-12-19 Telefonaktiebolaget L M Ericsson (Publ) Load balancing pseudowire encapsulated iptv channels over aggregated links
US20130340079A1 (en) 2012-06-14 2013-12-19 Kddi Corporation System and method for real-time reporting of anomalous internet protocol attacks
US8615022B2 (en) 2007-12-20 2013-12-24 British Telecommunications Public Limited Company Client/server adaptation scheme for communications traffic
US20140025823A1 (en) 2012-02-20 2014-01-23 F5 Networks, Inc. Methods for managing contended resource utilization in a multiprocessor architecture and devices thereof
US8646067B2 (en) 2008-01-26 2014-02-04 Citrix Systems, Inc. Policy driven fine grain URL encoding mechanism for SSL VPN clientless access
US20140040478A1 (en) 2000-09-26 2014-02-06 Brocade Communications Systems, Inc. Global server load balancing
US8665868B2 (en) 2005-08-19 2014-03-04 Cpacket Networks, Inc. Apparatus and method for enhancing forwarding and classification of network traffic with prioritized matching and categorization
US8665969B2 (en) 2003-08-14 2014-03-04 Broadcom Corporation System and method for generating pseudo MPEG information from digital video information
US20140095661A1 (en) 2006-03-31 2014-04-03 Research In Motion Limited System and method for provisioning a remote resource for an electronic device
US8701179B1 (en) 2011-11-04 2014-04-15 Juniper Networks, Inc. Secure network address translation
US8726338B2 (en) 2012-02-02 2014-05-13 Juniper Networks, Inc. Dynamic threat protection in mobile networks
US8726336B2 (en) 2010-12-29 2014-05-13 Sap Ag Authorizations for analytical reports
US8725836B2 (en) 2000-02-07 2014-05-13 Parallel Networks, Llc Method and apparatus for content synchronization
US8737304B2 (en) 2011-03-01 2014-05-27 Tekelec, Inc. Methods, systems, and computer readable media for hybrid session based diameter routing
US8804504B1 (en) 2010-09-16 2014-08-12 F5 Networks, Inc. System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device
US8819768B1 (en) 2011-05-03 2014-08-26 Robert Koeten Split password vault
US8819419B2 (en) 2003-04-03 2014-08-26 International Business Machines Corporation Method and system for dynamic encryption of a URL
US8819109B1 (en) 2005-09-01 2014-08-26 At&T Intellectual Property Ii, L.P. Data network communication using identifiers mappable to resource locators
US8830874B2 (en) 2011-07-25 2014-09-09 Samsung Electronics Co., Ltd. Method and apparatus for load balancing in cellular communication system
US20140269484A1 (en) 2013-03-14 2014-09-18 Viasat, Inc. Delaycast queue prioritization
US8873753B2 (en) 2012-08-27 2014-10-28 Verizon Patent And Licensing Inc. Analysis of network operation
US8875274B2 (en) 2008-11-10 2014-10-28 Blackberry Limited Methods and apparatus for providing indirect alternative paths to obtain session policy
US8886981B1 (en) 2010-09-15 2014-11-11 F5 Networks, Inc. Systems and methods for idle driven scheduling
US8908545B1 (en) 2010-07-08 2014-12-09 F5 Networks, Inc. System and method for handling TCP performance in network access with driver initiated application tunnel
US8954080B2 (en) 2012-12-14 2015-02-10 Tektronix, Inc. Monitoring traffic across diameter core agents
US9037166B2 (en) 2012-12-11 2015-05-19 Telefonaktiebolaget L M Ericsson (Publ) Apparatus and method for scheduling paging messages in a communications network
US9083760B1 (en) 2010-08-09 2015-07-14 F5 Networks, Inc. Dynamic cloning and reservation of detached idle connections

Patent Citations (985)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3950735A (en) 1974-01-04 1976-04-13 Honeywell Information Systems, Inc. Method and apparatus for dynamically controlling read/write operations in a peripheral subsystem
US4644532A (en) 1985-06-10 1987-02-17 International Business Machines Corporation Automatic update of topology in a hybrid network
US6041365A (en) 1985-10-29 2000-03-21 Kleinerman; Aurel Apparatus and method for high performance remote application gateway servers
JPS6310250A (en) 1986-06-30 1988-01-16 Fujitsu Ltd Managing system for virtual logical volume
US4897781A (en) 1987-02-13 1990-01-30 International Business Machines Corporation System and method for using cached data at a local node after re-opening a file at a remote node in a distributed networking environment
US4965772A (en) 1987-06-15 1990-10-23 International Business Machines Corporation Method and apparatus for communication network alert message construction
US5282201A (en) 1987-12-22 1994-01-25 Kendall Square Research Corporation Dynamic packet routing network
US4993030A (en) 1988-04-22 1991-02-12 Amdahl Corporation File system for a plurality of storage classes
US5303368A (en) 1989-02-28 1994-04-12 Kabushiki Kaisha Toshiba Dead lock preventing method for data base system
US5167024A (en) 1989-09-08 1992-11-24 Apple Computer, Inc. Power management for a laptop computer with slow and sleep modes
US5053953A (en) 1990-01-05 1991-10-01 Bull Hn Information Systems Inc. Apparatus for aligning arithmetic operands during fetch
US5023826A (en) 1990-01-11 1991-06-11 Bull Hn Information Systems Inc. Apparatus for skipping arithmetic calculations involving leading zeros
US5218695A (en) 1990-02-05 1993-06-08 Epoch Systems, Inc. File server system having high-speed write execution
WO1991014326A2 (en) 1990-03-05 1991-09-19 Massachusetts Institute Of Technology Switching networks with expansive and/or dispersive logical clusters for message routing
US5521591A (en) 1990-03-05 1996-05-28 Massachusetts Institute Of Technology Switching networks with expansive and/or dispersive logical clusters for message routing
US5327529A (en) 1990-09-24 1994-07-05 Geoworks Process of designing user's interfaces for application programs
US5475857A (en) 1990-09-28 1995-12-12 Massachusetts Institute Of Technology Express channels for diminishing latency and increasing throughput in an interconnection network
US5299312A (en) 1990-11-15 1994-03-29 Massachusetts Institute Of Technology Network fault recovery by controllable switching of subnetworks
US5367635A (en) 1991-08-29 1994-11-22 Hewlett-Packard Company Network management agent with user created objects providing additional functionality
US5511177A (en) 1991-11-21 1996-04-23 Hitachi, Ltd. File data multiplexing method and data processing system
US5611049A (en) 1992-06-03 1997-03-11 Pitts; William M. System for accessing distributed data cache channel at each network node to pass requests and data
CA2080530A1 (en) 1992-10-14 1994-04-15 Ho Kee Chiu Dynamic networking
US5371852A (en) 1992-10-14 1994-12-06 International Business Machines Corporation Method and apparatus for making a cluster of computers appear as a single host on a network
JPH06205006A (en) 1992-10-14 1994-07-22 Internatl Business Mach Corp <Ibm> Data communication network
EP0605088A2 (en) 1992-10-14 1994-07-06 International Business Machines Corporation Computer conferencing
US5649200A (en) 1993-01-08 1997-07-15 Atria Software, Inc. Dynamic rule-based version control system
US5586260A (en) 1993-02-12 1996-12-17 Digital Equipment Corporation Method and apparatus for authenticating a client to a server in computer systems which support different security mechanisms
US5548724A (en) 1993-03-22 1996-08-20 Hitachi, Ltd. File server system and file access control method of the same
JPH06332782A (en) 1993-03-22 1994-12-02 Hitachi Ltd File server system and file access controlling method therefor
US5596742A (en) 1993-04-02 1997-01-21 Massachusetts Institute Of Technology Virtual interconnections for reconfigurable logic systems
US5581764A (en) 1993-04-30 1996-12-03 Novadigm, Inc. Distributed computer network including hierarchical resource information structure and related method of distributing resources
US6104706A (en) 1993-06-09 2000-08-15 Intelligence-At-Large, Inc. Method and apparatus for multiple media digital communication system
US5623490A (en) 1993-06-09 1997-04-22 Intelligence-At-Large Method and apparatus for multiple media digital communication system
US5995491A (en) 1993-06-09 1999-11-30 Intelligence At Large, Inc. Method and apparatus for multiple media digital communication system
US6738357B1 (en) 1993-06-09 2004-05-18 Btg International Inc. Method and apparatus for multiple media digital communication system
US7075924B2 (en) 1993-06-09 2006-07-11 Btg International Inc. Methods for multiple media digital communication
US5406502A (en) 1993-06-29 1995-04-11 Elbit Ltd. System and method for measuring the operation of a device
US5519778A (en) 1993-08-13 1996-05-21 Silvio Micali Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications between the users
WO1995005712A2 (en) 1993-08-13 1995-02-23 Frank Thomson Leighton Secret key exchange
US5473362A (en) 1993-11-30 1995-12-05 Microsoft Corporation Video on demand system comprising stripped data across plural storable devices with time multiplex scheduling
US5550965A (en) 1993-12-27 1996-08-27 Lucent Technologies Inc. Method and system for operating a data processor to index primary data in real time with iconic table of contents
US5649194A (en) 1993-12-29 1997-07-15 Microsoft Corporation Unification of directory service with file system services
US6047129A (en) 1993-12-30 2000-04-04 Frye; Russell Software updating and distribution
US5519694A (en) 1994-02-04 1996-05-21 Massachusetts Institute Of Technology Construction of hierarchical networks through extension
US5832522A (en) 1994-02-25 1998-11-03 Kodak Limited Data storage management for network interconnected processors
US5537585A (en) 1994-02-25 1996-07-16 Avail Systems Corporation Data storage management for network interconnected processors
US5761484A (en) 1994-04-01 1998-06-02 Massachusetts Institute Of Technology Virtual interconnections for reconfigurable logic systems
US5659619A (en) 1994-05-11 1997-08-19 Aureal Semiconductor, Inc. Three-dimensional virtual audio display employing reduced complexity imaging filters
US6223206B1 (en) 1994-05-11 2001-04-24 International Business Machines Corporation Method and system for load balancing by replicating a portion of a file being read by a first stream onto second device and reading portion with a second stream capable of accessing
US5517617A (en) 1994-06-29 1996-05-14 Digital Equipment Corporation Automatic assignment of addresses in a computer communications network
US5606665A (en) 1994-07-01 1997-02-25 Digital Equipment Corporation Buffer descriptor prefetch in network and I/O design
JPH0821924A (en) 1994-07-05 1996-01-23 Fuji Elelctrochem Co Ltd Plural ports optical component having plural transmission paths
US5528701A (en) 1994-09-02 1996-06-18 Panasonic Technologies, Inc. Trie based method for indexing handwritten databases
US5768423A (en) 1994-09-02 1998-06-16 Panasonic Technologies Inc. Trie structure based method and apparatus for indexing and searching handwritten databases with dynamic search sequencing
US5590320A (en) 1994-09-14 1996-12-31 Smart Storage, Inc. Computer file directory system
US6349343B1 (en) 1994-09-15 2002-02-19 Visual Edge Software Limited System and method for providing interoperability among heterogeneous object systems
US5838970A (en) 1994-10-04 1998-11-17 Recognition International Inc. Object-oriented computer environment and related method
US5668943A (en) 1994-10-31 1997-09-16 International Business Machines Corporation Virtual shared disks with application transparent recovery
US6085234A (en) 1994-11-28 2000-07-04 Inca Technology, Inc. Remote file services network-infrastructure cache
US5892914A (en) 1994-11-28 1999-04-06 Pitts; William Michael System for accessing distributed data cache at each network node to pass requests and data
US5583995A (en) 1995-01-30 1996-12-10 Mrj, Inc. Apparatus and method for data storage and retrieval using bandwidth allocation
US5692180A (en) 1995-01-31 1997-11-25 International Business Machines Corporation Object-oriented cell directory database for a distributed computing environment
US5832283A (en) 1995-03-06 1998-11-03 Intel Corporation Method and apparatus for providing unattended on-demand availability of a computer system
US5724512A (en) 1995-04-17 1998-03-03 Lucent Technologies Inc. Methods and apparatus for storage and retrieval of name space information in a distributed computing system
JPH08339355A (en) 1995-04-17 1996-12-24 At & T Ipm Corp Method and apparatus for access to processing task executionin distributed system
EP0738970A1 (en) 1995-04-17 1996-10-23 AT&T IPM Corp. Methods and apparatus for storage and retrieval of name space information in a distributed computing system
EP0744850A2 (en) 1995-05-22 1996-11-27 Fore Systems, Inc. Digital network including early packet discard mechanism with adjustable threshold
US5936939A (en) 1995-05-22 1999-08-10 Fore Systems, Inc. Digital network including early packet discard mechanism with adjustable threshold
JPH08328760A (en) 1995-06-01 1996-12-13 Hitachi Ltd Disk array device
US6259405B1 (en) 1995-06-06 2001-07-10 Wayport, Inc. Geographic based communications service
US5951694A (en) 1995-06-07 1999-09-14 Microsoft Corporation Method of redirecting a client service session to a second application server without interrupting the session by forwarding service-specific information to the second server
JPH0916510A (en) 1995-06-29 1997-01-17 Ricoh Co Ltd File copying machine
US5721779A (en) 1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party
WO1997009805A1 (en) 1995-09-05 1997-03-13 Massachusetts Institute Of Technology Scalable, self-organizing packet radio network having decentralized channel management providing collision-free packet transfer
US5790554A (en) 1995-10-04 1998-08-04 Bay Networks, Inc. Method and apparatus for processing data packets in a network
US5832496A (en) 1995-10-12 1998-11-03 Ncr Corporation System and method for performing intelligent analysis of a computer database
US6029175A (en) 1995-10-26 2000-02-22 Teknowledge Corporation Automatic retrieval of changed files by a network software agent
US20070088822A1 (en) 1995-11-03 2007-04-19 Cisco Technology, Inc. System for Distributing Load Over Multiple Servers at an Internet Site
US5825772A (en) 1995-11-15 1998-10-20 Cabletron Systems, Inc. Distributed connection-oriented services for switched communications networks
US5892932A (en) 1995-11-21 1999-04-06 Fore Systems, Inc. Reprogrammable switching apparatus and method
US5812550A (en) 1995-12-23 1998-09-22 Electronics And Telecommunications Research Institute Asynchronous transfer mode (ATM) layer function processing apparatus with an enlarged structure
US6128657A (en) 1996-02-14 2000-10-03 Fujitsu Limited Load sharing system
US5862325A (en) 1996-02-29 1999-01-19 Intermind Corporation Computer-based communication system and method using metadata defining a control structure
US6111876A (en) 1996-03-12 2000-08-29 Nortel Networks Limited VLAN frame format
US5949885A (en) 1996-03-12 1999-09-07 Leighton; F. Thomson Method for protecting content using watermarking
US5959990A (en) 1996-03-12 1999-09-28 Bay Networks, Inc. VLAN frame format
US5884303A (en) 1996-03-15 1999-03-16 International Computers Limited Parallel searching technique
US5752023A (en) 1996-04-24 1998-05-12 Massachusetts Institute Of Technology Networked database system for geographically dispersed global sustainability data
US20010014891A1 (en) 1996-05-24 2001-08-16 Eric M. Hoffert Display of media previews
US5663018A (en) 1996-05-28 1997-09-02 Motorola Pattern writing method during X-ray mask fabrication
WO1997045800A1 (en) 1996-05-30 1997-12-04 Massachusetts Institute Of Technology Querying heterogeneous data sources distributed over a network using context interchange and data extraction
US6181336B1 (en) 1996-05-31 2001-01-30 Silicon Graphics, Inc. Database-independent, scalable, object-oriented architecture and API for managing digital multimedia assets
US6078929A (en) 1996-06-07 2000-06-20 At&T Internet file system
US5802052A (en) 1996-06-26 1998-09-01 Level One Communication, Inc. Scalable high performance switch element for a shared memory packet or ATM cell switch fabric
US6154777A (en) 1996-07-01 2000-11-28 Sun Microsystems, Inc. System for context-dependent name resolution
US7283540B2 (en) 1996-07-04 2007-10-16 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US7653077B2 (en) 1996-07-04 2010-01-26 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US7701952B2 (en) 1996-07-04 2010-04-20 Hitachi, Ltd. Packet communication method and apparatus and a recording medium storing a packet communication program
US8582599B2 (en) 1996-07-04 2013-11-12 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US7088726B1 (en) 1996-07-04 2006-08-08 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US7957405B2 (en) 1996-07-04 2011-06-07 Hitachi, Ltd. Packet communication method and apparatus and a recording medium storing a packet communication program
US7965724B2 (en) 1996-07-04 2011-06-21 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US6038233A (en) 1996-07-04 2000-03-14 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US7158526B2 (en) 1996-07-04 2007-01-02 Hitachi, Ltd. Packet communication method and apparatus and a recording medium storing a packet communication program
US6580717B1 (en) 1996-07-04 2003-06-17 Hitachi, Ltd. Packet communication method and apparatus and a recording medium storing a packet communication program
US7248591B2 (en) 1996-07-04 2007-07-24 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US7385989B2 (en) 1996-07-04 2008-06-10 Hitachi, Ltd. Packet communication method and apparatus and a recording medium storing a packet communication program
US7251247B2 (en) 1996-07-04 2007-07-31 Hitachi, Ltd. Translator for IP networks, network system using the translator, and IP network coupling method therefor
US5919247A (en) 1996-07-24 1999-07-06 Marimba, Inc. Method for the distribution of code and data updates
US5917998A (en) 1996-07-26 1999-06-29 International Business Machines Corporation Method and apparatus for establishing and maintaining the status of membership sets used in mirrored read and write input/output without logging
US6044367A (en) 1996-08-02 2000-03-28 Hewlett-Packard Company Distributed I/O store
US6182139B1 (en) 1996-08-05 2001-01-30 Resonate Inc. Client-side resource-based load-balancing with delayed-resource-binding using TCP state migration to WWW server farm
US5774660A (en) 1996-08-05 1998-06-30 Resonate, Inc. World-wide-web server with delayed resource-binding for resource-based load balancing on a distributed resource multi-node network
US6393581B1 (en) 1996-08-29 2002-05-21 Cornell Research Foundation, Inc. Reliable time delay-constrained cluster computing
US6072942A (en) 1996-09-18 2000-06-06 Secure Computing Corporation System and method of electronic mail filtering using interconnected nodes
US6012083A (en) 1996-09-24 2000-01-04 Ricoh Company Ltd. Method and apparatus for document processing using agents to process transactions created based on document content
US7072338B2 (en) 1996-11-01 2006-07-04 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6912219B2 (en) 1996-11-01 2005-06-28 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4 converting apparatus
US7072339B2 (en) 1996-11-01 2006-07-04 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US7193998B2 (en) 1996-11-01 2007-03-20 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6690669B1 (en) 1996-11-01 2004-02-10 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US7746863B2 (en) 1996-11-01 2010-06-29 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US8594108B2 (en) 1996-11-01 2013-11-26 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6920137B2 (en) 1996-11-01 2005-07-19 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6928077B2 (en) 1996-11-01 2005-08-09 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6920136B2 (en) 1996-11-01 2005-07-19 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US8031716B2 (en) 1996-11-01 2011-10-04 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6920138B2 (en) 1996-11-01 2005-07-19 Hitachi, Ltd. Communication method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US6118784A (en) 1996-11-01 2000-09-12 Hitachi, Ltd. Communicating method between IPv4 terminal and IPv6 terminal and IPv4-IPv6 converting apparatus
US5920873A (en) 1996-12-06 1999-07-06 International Business Machines Corporation Data management control system for file and database
US5946690A (en) 1996-12-17 1999-08-31 Inca Technology, Inc. NDC consistency reconnect mechanism
US5941988A (en) 1997-01-27 1999-08-24 International Business Machines Corporation Session and transport layer proxies via TCP glue
US5875296A (en) 1997-01-28 1999-02-23 International Business Machines Corporation Distributed file system web server user authentication with cookies
US5958053A (en) 1997-01-30 1999-09-28 At&T Corp. Communications protocol with improved security
US5937406A (en) 1997-01-31 1999-08-10 Informix Software, Inc. File system interface to a database
US6026452A (en) 1997-02-26 2000-02-15 Pitts; William Michael Network distributed site cache RAM claimed as up/down stream request/reply channel for storing anticipated data and meta data
US6615267B1 (en) 1997-03-13 2003-09-02 Motorola, Inc. System and method for delivery of information over narrow-band communications links
US20010009554A1 (en) 1997-03-17 2001-07-26 Katseff Howard Paul Methods and apparatus for providing improved quality of packet transmission in applications such as internet telephony
US6412004B1 (en) 1997-03-27 2002-06-25 Microsoft Corporation Metaserver for a multimedia distribution network
US6282610B1 (en) 1997-03-31 2001-08-28 Lsi Logic Corporation Storage controller providing store-and-forward mechanism in distributed data storage system
US5991302A (en) 1997-04-10 1999-11-23 Cisco Technology, Inc. Technique for maintaining prioritization of data transferred among heterogeneous nodes of a computer network
US5983281A (en) 1997-04-24 1999-11-09 International Business Machines Corporation Load balancing in a multiple network environment
US6161145A (en) 1997-05-08 2000-12-12 International Business Machines Corporation Updating server-related data at a client
US5806061A (en) 1997-05-20 1998-09-08 Hewlett-Packard Company Method for cost-based optimization over multimeida repositories
US6308162B1 (en) 1997-05-21 2001-10-23 Khimetrics, Inc. Method for controlled optimization of enterprise planning models
US6006260A (en) 1997-06-03 1999-12-21 Keynote Systems, Inc. Method and apparatus for evalutating service to a user over the internet
US5974460A (en) 1997-06-16 1999-10-26 International Business Machines Corporation Apparatus and method for selecting an optimum telecommunications link
US5897638A (en) 1997-06-16 1999-04-27 Ab Initio Software Corporation Parallel virtual file system
US6263368B1 (en) 1997-06-19 2001-07-17 Sun Microsystems, Inc. Network load balancing for multi-computer server by counting message packets to/from multi-computer server
US5905990A (en) 1997-06-23 1999-05-18 International Business Machines Corporation File system viewpath mechanism
US6289345B1 (en) 1997-06-26 2001-09-11 Fujitsu Limited Design information management system having a bulk data server and a metadata server
US6119234A (en) 1997-06-27 2000-09-12 Sun Microsystems, Inc. Method and apparatus for client-host communication over a computer network
US6542936B1 (en) 1997-07-03 2003-04-01 Ipac Acquisition Subsidiary I, Llc System for creating messages including image information
US5893086A (en) 1997-07-11 1999-04-06 International Business Machines Corporation Parallel file system and method with extensible hashing
US6446108B1 (en) 1997-07-18 2002-09-03 Lucent Technologies Inc. Method for wide area network service location
WO1999005829A1 (en) 1997-07-25 1999-02-04 Massachusetts Institute Of Technology Cost based routing protocol
US6028857A (en) 1997-07-25 2000-02-22 Massachusetts Institute Of Technology Self-organizing network
US6298380B1 (en) 1997-07-31 2001-10-02 Cisco Technology, Inc. Method and apparatus for reducing overhead on a proxied connection
US6006264A (en) 1997-08-01 1999-12-21 Arrowpoint Communications, Inc. Method and system for directing a flow between a client and a server
WO1999006913A1 (en) 1997-08-01 1999-02-11 Arrowpoint Communications, Inc. Content-aware flow switching
US6330574B1 (en) 1997-08-05 2001-12-11 Fujitsu Limited Compression/decompression of tags in markup documents by creating a tag code/decode table based on the encoding of tags in a DTD included in the documents
US5988847A (en) 1997-08-22 1999-11-23 Honeywell Inc. Systems and methods for implementing a dynamic cache in a supervisory control system
US6051169A (en) 1997-08-27 2000-04-18 International Business Machines Corporation Vacuum baking process
WO1999010858A2 (en) 1997-08-29 1999-03-04 Leighton F Thomson Method for protecting content using watermarking
US6078956A (en) 1997-09-08 2000-06-20 International Business Machines Corporation World wide web end user response time monitor
US6202156B1 (en) 1997-09-12 2001-03-13 Sun Microsystems, Inc. Remote access-controlled communication
US6067558A (en) 1997-09-18 2000-05-23 Wendt; James Gordon Method and apparatus for providing increased content from a resource constrained device
US6493804B1 (en) 1997-10-01 2002-12-10 Regents Of The University Of Minnesota Global file system and data storage device locks
US6128279A (en) 1997-10-06 2000-10-03 Web Balance, Inc. System for balancing loads among network servers
US6513061B1 (en) 1997-10-07 2003-01-28 Hitachi, Ltd. Proxy server selecting server and proxy server
US6160874A (en) 1997-10-21 2000-12-12 Mci Communications Corporation Validation gateway
US6738790B1 (en) 1997-10-31 2004-05-18 Oracle International Corporation Approach for accessing large objects
US5999664A (en) 1997-11-14 1999-12-07 Xerox Corporation System for searching a corpus of document images by user specified document layout components
US6092196A (en) 1997-11-25 2000-07-18 Nortel Networks Limited HTTP distributed remote user authentication system
US6516351B2 (en) 1997-12-05 2003-02-04 Network Appliance, Inc. Enforcing uniform file-locking for diverse file-locking protocols
US7293097B2 (en) 1997-12-05 2007-11-06 Network Appliance, Inc. Enforcing uniform file-locking for diverse file-locking protocols
US6601084B1 (en) 1997-12-19 2003-07-29 Avaya Technology Corp. Dynamic load balancer for multiple network servers
US7668166B1 (en) 1997-12-23 2010-02-23 Cisco Technology, Inc. Peer-model support for virtual private networks having potentially overlapping addresses
US6246684B1 (en) 1997-12-24 2001-06-12 Nortel Networks Limited Method and apparatus for re-ordering data packets in a network environment
US7111115B2 (en) 1997-12-24 2006-09-19 Avid Technology, Inc. Computer system and process for transferring multiple high bandwidth streams of data between multiple storage units and multiple applications in a scalable and reliable manner
US6233648B1 (en) 1997-12-26 2001-05-15 Kabushiki Kaisha Toshiba Disk storage system and data update method used therefor
US6128717A (en) 1998-01-20 2000-10-03 Quantum Corporation Method and apparatus for storage application programming interface for digital mass storage and retrieval based upon data object type or size and characteristics of the data storage device
US6922688B1 (en) 1998-01-23 2005-07-26 Adaptec, Inc. Computer system storage
US6029168A (en) 1998-01-23 2000-02-22 Tricord Systems, Inc. Decentralized file mapping in a striped network file system in a distributed computing environment
WO1999039373A2 (en) 1998-01-30 1999-08-05 Trustees Of Princeton University Fabrication of organic semiconductor devices using ink jet printing
US6484261B1 (en) 1998-02-17 2002-11-19 Cisco Technology, Inc. Graphical network security policy management
US6161185A (en) 1998-03-06 2000-12-12 Mci Communications Corporation Personal authentication system and method for multiple computer platform
JPH11282741A (en) 1998-03-27 1999-10-15 Hitachi Ltd Mounting method, film access method for directory and access authority decision method
US6088694A (en) 1998-03-31 2000-07-11 International Business Machines Corporation Continuous availability and efficient backup for externally referenced objects
US6754228B1 (en) 1998-03-31 2004-06-22 Telefonaktiebolaget Lm Ericsson (Publ) Method and device for data flow control
US6170022B1 (en) 1998-04-03 2001-01-02 International Business Machines Corporation Method and system for monitoring and controlling data flow in a network congestion state by changing each calculated pause time by a random amount
US6876654B1 (en) 1998-04-10 2005-04-05 Intel Corporation Method and apparatus for multiprotocol switching and routing
US6128627A (en) 1998-04-15 2000-10-03 Inktomi Corporation Consistent data storage in an object cache
US6292832B1 (en) 1998-05-26 2001-09-18 Cisco Technology, Inc. System and method for determining a preferred service in a network
WO1999064967A1 (en) 1998-06-12 1999-12-16 Telefonaktiebolaget Lm Ericsson (Publ) A method and a system for transmitting a cookie
US6178423B1 (en) 1998-06-23 2001-01-23 Microsoft Corporation System and method for recycling numerical values in a computer system
US6438595B1 (en) 1998-06-24 2002-08-20 Emc Corporation Load balancing using directory services in a data processing system
US6253226B1 (en) 1998-06-24 2001-06-26 Oracle Corporation Duration-based memory management of complex objects
US6256031B1 (en) 1998-06-26 2001-07-03 Microsoft Corporation Integration of physical and virtual namespace
US6260070B1 (en) 1998-06-30 2001-07-10 Dhaval N. Shah System and method for determining a preferred mirrored service in a network by evaluating a border gateway protocol
US6938059B2 (en) 1998-06-30 2005-08-30 Emc Corporation System for determining the mapping of logical objects in a data storage system
US7127556B2 (en) 1998-06-30 2006-10-24 Emc Corporation Method and apparatus for initializing logical objects in a data storage system
US6490624B1 (en) 1998-07-10 2002-12-03 Entrust, Inc. Session management in a stateless network system
US6108703A (en) 1998-07-14 2000-08-22 Massachusetts Institute Of Technology Global hosting system
WO2000004458A1 (en) 1998-07-14 2000-01-27 Massachusetts Institute Of Technology Global document hosting system utilizing embedded content distributed ghost servers
US6363056B1 (en) 1998-07-15 2002-03-26 International Business Machines Corporation Low overhead continuous monitoring of network performance
WO2000004422A2 (en) 1998-07-17 2000-01-27 Leighton F Thomson Method for image processing to facilitate copy protection
US6237008B1 (en) 1998-07-20 2001-05-22 International Business Machines Corporation System and method for enabling pair-pair remote copy storage volumes to mirror data in another storage volume
US20030005172A1 (en) 1998-07-22 2003-01-02 Amanda Elizabeth Chessell Apparatus, method and computer program product for client/server computing with improved correspondence between transaction identifiers when supporting subordinate resource manager(s)
US6353848B1 (en) 1998-07-31 2002-03-05 Flashpoint Technology, Inc. Method and system allowing a client computer to access a portable digital image capture unit over a network
US6289012B1 (en) 1998-08-03 2001-09-11 Instanton Corporation High concurrency data download apparatus and method
US20090196282A1 (en) 1998-08-19 2009-08-06 Great Links G.B. Limited Liability Company Methods and apparatus for providing quality-of-service guarantees in computer networks
US6233612B1 (en) 1998-08-31 2001-05-15 International Business Machines Corporation Dynamic network protocol management information base options
US6327622B1 (en) 1998-09-03 2001-12-04 Sun Microsystems, Inc. Load balancing in a network environment
US20040167967A1 (en) 1998-09-08 2004-08-26 Tenzing Communications, Inc. Communications systems for aircraft
US6772219B1 (en) 1998-09-18 2004-08-03 Kabushiki Kaisha Toshiba Message relaying scheme based on switching in units of flows
US6253230B1 (en) 1998-09-22 2001-06-26 International Business Machines Corporation Distributed scalable device for selecting a server from a server cluster and a switched path to the selected server
US6606663B1 (en) 1998-09-29 2003-08-12 Openwave Systems Inc. Method and apparatus for caching credentials in proxy servers for wireless user agents
US7293099B1 (en) 1998-09-29 2007-11-06 Sun Microsystems, Inc. Heterogeneous network file access
US6636503B1 (en) 1998-10-06 2003-10-21 Siemens Information & Communication Networks, Inc. Method and system for communicating with a telecommunications switch
US6480476B1 (en) 1998-10-15 2002-11-12 Telefonaktiebolaget Lm Ericsson (Publ) Variable sleep mode for mobile stations in a mobile communications
US7120128B2 (en) 1998-10-23 2006-10-10 Brocade Communications Systems, Inc. Method and system for creating and implementing zones within a fibre channel system
US6718380B1 (en) 1998-10-26 2004-04-06 Cisco Technology, Inc. Method and apparatus for storing policies for policy-based management of network quality of service
US6661802B1 (en) 1998-10-27 2003-12-09 Fujitsu Network Communications, Inc. Congestion management
US7921211B2 (en) * 1998-10-30 2011-04-05 Virnetx, Inc. Agile network protocol for secure communications using secure domain names
US6304913B1 (en) 1998-11-09 2001-10-16 Telefonaktiebolaget L M Ericsson (Publ) Internet system and method for selecting a closest server from a plurality of alternative servers
US6691165B1 (en) 1998-11-10 2004-02-10 Rainfinity, Inc. Distributed server cluster for controlling network traffic
US6954780B2 (en) 1998-11-10 2005-10-11 Netscaler, Inc. Internet client-server multiplexer
US20020059428A1 (en) 1998-11-10 2002-05-16 Netscaler, Inc. Internet client-server multiplexer
US7577723B2 (en) 1998-11-12 2009-08-18 Ricoh Co., Ltd. Method and apparatus for automatic network configuration
US6397246B1 (en) 1998-11-13 2002-05-28 International Business Machines Corporation Method and system for processing document requests in a network system
US6360270B1 (en) 1998-11-16 2002-03-19 Hewlett-Packard Company Hybrid and predictive admission control strategies for a server
US6347339B1 (en) 1998-12-01 2002-02-12 Cisco Technology, Inc. Detecting an active network node using a login attempt
US6396833B1 (en) 1998-12-02 2002-05-28 Cisco Technology, Inc. Per user and network routing tables
US6636894B1 (en) 1998-12-08 2003-10-21 Nomadix, Inc. Systems and methods for redirecting users having transparent computer access to a network using a gateway device having redirection capability
JP2000183935A (en) 1998-12-10 2000-06-30 Omron Corp Node and intra-node data processing method
US6389462B1 (en) 1998-12-16 2002-05-14 Lucent Technologies Inc. Method and apparatus for transparently directing requests for web objects to proxy caches
US6990074B2 (en) 1998-12-16 2006-01-24 Nortel Networks Limited Method and apparatus for the control of multimedia services in networks
US6367009B1 (en) 1998-12-17 2002-04-02 International Business Machines Corporation Extending SSL to a multi-tier environment using delegation of authentication and authority
US6510135B1 (en) 1998-12-18 2003-01-21 Nortel Networks Limited Flow-level demultiplexing within routers
US20020012352A1 (en) 1998-12-18 2002-01-31 Goran Hansson Internet protocol handler for telecommunications platform with processor cluster
US6612490B1 (en) 1998-12-22 2003-09-02 International Business Mahines Corporation Extended card file system
US6370527B1 (en) 1998-12-29 2002-04-09 At&T Corp. Method and apparatus for searching distributed networks using a plurality of search devices
US6487561B1 (en) 1998-12-31 2002-11-26 Emc Corporation Apparatus and methods for copying, backing up, and restoring data using a backup segment size larger than the storage block size
US20070174491A1 (en) 1999-01-05 2007-07-26 Still David N Selectively forced redirection of network traffic
US20010047293A1 (en) 1999-01-26 2001-11-29 Waller Matthew A. System, method and article of manufacture to optimize inventory and inventory investment utilization in a collaborative context
US20020035537A1 (en) 1999-01-26 2002-03-21 Waller Matthew A. Method for economic bidding between retailers and suppliers of goods in branded, replenished categories
US6757706B1 (en) 1999-01-28 2004-06-29 International Business Machines Corporation Method and apparatus for providing responses for requests of off-line clients
US6560230B1 (en) 1999-02-01 2003-05-06 Redback Networks Inc. Packet scheduling methods and apparatus
US6876629B2 (en) 1999-02-04 2005-04-05 Uortel Networks Limited Rate-controlled multi-class high-capacity packet switch
US7028182B1 (en) * 1999-02-19 2006-04-11 Nexsys Electronics, Inc. Secure network system and method for transfer of medical information
US6466580B1 (en) 1999-02-23 2002-10-15 Advanced Micro Devices, Inc. Method and apparatus for processing high and low priority frame data transmitted in a data communication system
US6970924B1 (en) 1999-02-23 2005-11-29 Visual Networks, Inc. Methods and apparatus for monitoring end-user experience in a distributed network
US6192051B1 (en) 1999-02-26 2001-02-20 Redstone Communications, Inc. Network router search engine using compressed tree forwarding table
US6650640B1 (en) 1999-03-01 2003-11-18 Sun Microsystems, Inc. Method and apparatus for managing a network flow in a high performance network interface
US6430562B1 (en) 1999-03-01 2002-08-06 Electronic Data Systems Corporation Integrated resource management system and method
US6324581B1 (en) 1999-03-03 2001-11-27 Emc Corporation File server system using file system storage, data movers, and an exchange of meta data among data movers for file locking and direct access to shared file systems
US6973455B1 (en) 1999-03-03 2005-12-06 Emc Corporation File server system providing direct data sharing between clients with a server acting as an arbiter and coordinator
US6839850B1 (en) 1999-03-04 2005-01-04 Prc, Inc. Method and system for detecting intrusion into and misuse of a data processing system
US6760775B1 (en) 1999-03-05 2004-07-06 At&T Corp. System, method and apparatus for network service load and reliability management
US20120039341A1 (en) 1999-03-10 2012-02-16 Aamer Latif Method and apparatus for transferring data between ip network devices and scsi and fibre channel devices over an ip network
US7349391B2 (en) 1999-03-19 2008-03-25 F5 Networks, Inc. Tunneling between a bus and a network
US6338082B1 (en) 1999-03-22 2002-01-08 Eric Schneider Method, product, and apparatus for requesting a network resource
US6751663B1 (en) 1999-03-25 2004-06-15 Nortel Networks Limited System wide flow aggregation process for aggregating network activity records
US7310339B1 (en) 1999-03-31 2007-12-18 British Telecommunications Public Limited Company Packet messaging method and apparatus
WO2000058870A2 (en) 1999-03-31 2000-10-05 America Online, Inc. Handling a request for information provided by a network site
US6701415B1 (en) 1999-03-31 2004-03-02 America Online, Inc. Selecting a cache for a request for information
US6721794B2 (en) 1999-04-01 2004-04-13 Diva Systems Corp. Method of data management for efficiently storing and retrieving data to respond to user access requests
US6795860B1 (en) 1999-04-05 2004-09-21 Cisco Technology, Inc. System and method for selecting a service with dynamically changing information
US6519643B1 (en) 1999-04-29 2003-02-11 Attachmate Corporation Method and system for a session allocation manager (“SAM”)
US6816901B1 (en) 1999-05-06 2004-11-09 Cisco Technology, Inc. Proxy session count limitation
US20060259949A1 (en) 1999-05-12 2006-11-16 Softricity, Inc. Policy based composite file system and method
US6888836B1 (en) 1999-05-26 2005-05-03 Hewlett-Packard Development Company, L.P. Method for allocating web sites on a web hosting cluster
US6708187B1 (en) 1999-06-10 2004-03-16 Alcatel Method for selective LDAP database synchronization
US6516350B1 (en) 1999-06-17 2003-02-04 International Business Machines Corporation Self-regulated resource management of distributed computer resources
US7113962B1 (en) 1999-06-22 2006-09-26 F5 Networks, Inc. Method and system for automatically updating content stored on servers connected by a network
US6973490B1 (en) 1999-06-23 2005-12-06 Savvis Communications Corp. Method and system for object-level web performance and analysis
US6781986B1 (en) 1999-06-25 2004-08-24 Nortel Networks Limited Scalable high capacity switch architecture method, apparatus and system
US6650641B1 (en) 1999-07-02 2003-11-18 Cisco Technology, Inc. Network address translation using a forwarding agent
US6742045B1 (en) 1999-07-02 2004-05-25 Cisco Technology, Inc. Handling packet fragments in a distributed network service environment
US6510458B1 (en) 1999-07-15 2003-01-21 International Business Machines Corporation Blocking saves to web browser cache based on content rating
US20010023442A1 (en) 1999-07-15 2001-09-20 Richard R. Masters Method and system for storing load balancing information with an http cookie
US6374300B2 (en) 1999-07-15 2002-04-16 F5 Networks, Inc. Method and system for storing load balancing information with an HTTP cookie
US6389433B1 (en) 1999-07-16 2002-05-14 Microsoft Corporation Method and system for automatically merging files into a single instance store
US6477544B1 (en) 1999-07-16 2002-11-05 Microsoft Corporation Single instance store for file systems
US6654346B1 (en) 1999-07-19 2003-11-25 Dunti Corporation Communication network across which packets of data are transmitted according to a priority scheme
US6374263B1 (en) 1999-07-19 2002-04-16 International Business Machines Corp. System for maintaining precomputed views
US6514085B2 (en) 1999-07-30 2003-02-04 Element K Online Llc Methods and apparatus for computer based training relating to devices
US6549916B1 (en) 1999-08-05 2003-04-15 Oracle Corporation Event notification system tied to a file system
US6760337B1 (en) 1999-08-17 2004-07-06 Conexant Systems, Inc. Integrated circuit that processes communication packets with scheduler circuitry having multiple priority levels
US6754215B1 (en) 1999-08-17 2004-06-22 Nec Corporation Packet scheduling device
US6694517B1 (en) 1999-08-27 2004-02-17 Diversified Control, Inc. Broadband communication network with low power addressable tap system for controlling subscriber access
US6868082B1 (en) 1999-08-30 2005-03-15 International Business Machines Corporation Network processor interface for building scalable switching systems
EP1081918A2 (en) 1999-09-04 2001-03-07 Hewlett-Packard Company Providing secure access through network firewalls
US6343324B1 (en) 1999-09-13 2002-01-29 International Business Machines Corporation Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
US6578069B1 (en) 1999-10-04 2003-06-10 Microsoft Corporation Method, data structure, and computer program product for identifying a network resource
US6556997B1 (en) 1999-10-07 2003-04-29 Comverse Ltd. Information retrieval system
US20040059789A1 (en) 1999-10-29 2004-03-25 Annie Shum System and method for tracking messages in an electronic messaging system
US20030074301A1 (en) 1999-11-01 2003-04-17 Neal Solomon System, method, and apparatus for an intelligent search agent to access data in a distributed network
US20050187866A1 (en) 1999-11-16 2005-08-25 Lee Andre S. Method and system for executing financial transactions via a communication medium
US6748420B1 (en) 1999-11-23 2004-06-08 Cisco Technology, Inc. Methods and apparatus for providing shared access to an application
US6339785B1 (en) 1999-11-24 2002-01-15 Idan Feigenbaum Multi-server file download
US20020010783A1 (en) 1999-12-06 2002-01-24 Leonard Primak System and method for enhancing operation of a web server cluster
US6950434B1 (en) 1999-12-07 2005-09-27 Advanced Micro Devices, Inc. Arrangement for searching packet policies using multi-key hash searches in a network switch
US6683873B1 (en) 1999-12-27 2004-01-27 Cisco Technology, Inc. Methods and apparatus for redirecting network traffic
US6847959B1 (en) 2000-01-05 2005-01-25 Apple Computer, Inc. Universal interface for retrieval of information in a computer system
US20010007560A1 (en) 2000-01-11 2001-07-12 Michio Masuda Multi-layer class identifying communication apparatus with priority control
US6871221B1 (en) 2000-01-21 2005-03-22 Scriptlogic Corporation Method and apparatus to manage network client logon scripts using a graphical management and administration tool
US20030033535A1 (en) 2000-01-27 2003-02-13 Gwyn Fisher Method and system for implementing a common user logon to multiple applications
US6744776B1 (en) 2000-01-28 2004-06-01 Advanced Micro Devices, Inc. Servicing priority traffic in multiport network switch
US8725836B2 (en) 2000-02-07 2014-05-13 Parallel Networks, Llc Method and apparatus for content synchronization
US20030012382A1 (en) 2000-02-08 2003-01-16 Azim Ferchichi Single sign-on process
US6742035B1 (en) 2000-02-28 2004-05-25 Novell, Inc. Directory-based volume location service for a distributed file system
US6829238B2 (en) 2000-02-28 2004-12-07 Fujitsu Limited IP router device having a TCP termination function and a medium thereof
US20050246393A1 (en) 2000-03-03 2005-11-03 Intel Corporation Distributed storage cluster architecture
US7590747B2 (en) 2000-03-03 2009-09-15 Intel Corporation Distributed storage cluster architecture
US20030046291A1 (en) 2000-03-10 2003-03-06 Fascenda Anthony C. System, method and apparatus for utilizing transaction databases in a client - server environment
US6826613B1 (en) 2000-03-15 2004-11-30 3Com Corporation Virtually addressing storage devices through a switch
US6601101B1 (en) 2000-03-15 2003-07-29 3Com Corporation Transparent access to network attached devices
US20010051955A1 (en) 2000-03-17 2001-12-13 Wong John P. Mirror file system
US6880017B1 (en) 2000-03-20 2005-04-12 International Business Machines Corporation System and method for providing an adaptive streaming flow control mechanism between the TCP and IP layers of the TCP/IP suite of protocols
US8380854B2 (en) 2000-03-21 2013-02-19 F5 Networks, Inc. Simplified method for processing multiple connections from the same client
US9077554B1 (en) 2000-03-21 2015-07-07 F5 Networks, Inc. Simplified method for processing multiple connections from the same client
US8788665B2 (en) 2000-03-21 2014-07-22 F5 Networks, Inc. Method and system for optimizing a network by independently scaling control segments and data flow
US7343413B2 (en) 2000-03-21 2008-03-11 F5 Networks, Inc. Method and system for optimizing a network by independently scaling control segments and data flow
US8447871B1 (en) 2000-03-21 2013-05-21 F5 Networks, Inc. Simplified method for processing multiple connections from the same client
US6779039B1 (en) 2000-03-31 2004-08-17 Avaya Technology Corp. System and method for routing message traffic using a cluster of routers sharing a single logical IP address distinct from unique IP addresses of the routers
US6865593B1 (en) 2000-04-12 2005-03-08 Webcollege, Inc. Dynamic integration of web sites
US7240100B1 (en) 2000-04-14 2007-07-03 Akamai Technologies, Inc. Content delivery network (CDN) content server request handling mechanism with metadata framework support
US6798777B1 (en) 2000-04-17 2004-09-28 Juniper Networks, Inc. Filtering and route lookup in a switching device
US6883137B1 (en) 2000-04-17 2005-04-19 International Business Machines Corporation System and method for schema-driven compression of extensible mark-up language (XML) documents
US7308709B1 (en) 2000-04-21 2007-12-11 Microsoft Corporation System and method for managing and authenticating services via service principal names
US6556998B1 (en) 2000-05-04 2003-04-29 Matsushita Electric Industrial Co., Ltd. Real-time distributed file system
US6987763B2 (en) 2000-05-04 2006-01-17 Comverse Ltd. Load balancing
US20050044158A1 (en) 2000-05-04 2005-02-24 Bellsouth Intellectual Property Corporation Data compression in electronic communications
US7089286B1 (en) 2000-05-04 2006-08-08 Bellsouth Intellectual Property Corporation Method and apparatus for compressing attachments to electronic mail communications for transmission
US6868447B1 (en) 2000-05-09 2005-03-15 Sun Microsystems, Inc. Mechanism and apparatus for returning results of services in a distributed computing environment
US6434081B1 (en) 2000-05-12 2002-08-13 Micron Technology, Inc. Calibration technique for memory devices
US6957272B2 (en) 2000-05-24 2005-10-18 Alcatel Internetworking (Pe), Inc. Stackable lookup engines
US6907037B2 (en) 2000-05-30 2005-06-14 Hitachi, Ltd. Multicast routing method and an apparatus for routing a multicast packet
US7400645B2 (en) 2000-05-30 2008-07-15 Hitachi, Ltd. Multicast routing method and an apparatus for routing a multicast packet
US7400646B2 (en) 2000-05-30 2008-07-15 Hitachi, Ltd. Multicast routing method and an apparatus for routing a multicast packet
US20020143819A1 (en) 2000-05-31 2002-10-03 Cheng Han Web service syndication system
US20020038360A1 (en) 2000-05-31 2002-03-28 Matthew Andrews System and method for locating a closest server in response to a client domain name request
US7167821B2 (en) 2000-06-06 2007-01-23 Microsoft Corporation Evaluating hardware models having resource contention
US7280971B1 (en) 2000-06-09 2007-10-09 At&T Bls Intellectual Property, Inc. Method and system for server-based error processing in support of legacy-based usage and billing systems
US7080314B1 (en) 2000-06-16 2006-07-18 Lucent Technologies Inc. Document descriptor extraction method
US20060184589A1 (en) 2000-06-21 2006-08-17 Microsoft Corporation Linked Value Replication
US20020059263A1 (en) 2000-06-27 2002-05-16 Seiji Shima Data management system for storages
US6938039B1 (en) 2000-06-30 2005-08-30 Emc Corporation Concurrent file across at a target file server during migration of file systems between file servers using a network file system access protocol
US20060112176A1 (en) 2000-07-19 2006-05-25 Liu Zaide E Domain name resolution using a distributed DNS network
US6754699B2 (en) 2000-07-19 2004-06-22 Speedera Networks, Inc. Content delivery and global traffic management network system
US7113996B2 (en) 2000-07-21 2006-09-26 Sandy Craig Kronenberg Method and system for secured transport and storage of data on a network
US7403520B2 (en) 2000-07-21 2008-07-22 Hitachi, Ltd. Multicast routing method and apparatus for routing multicast packet
US7454480B2 (en) 2000-08-11 2008-11-18 Napster, Inc. System and method for optimizing access to information in peer-to-peer computer networks
US7500243B2 (en) 2000-08-17 2009-03-03 Sun Microsystems, Inc. Load balancing method and system using multiple load balancing servers
US20020049842A1 (en) 2000-08-17 2002-04-25 Matthias Huetsch Load balancing method and system
US20040103283A1 (en) 2000-08-18 2004-05-27 Zoltan Hornak Method and system for authentification of a mobile user via a gateway
US20020065848A1 (en) 2000-08-21 2002-05-30 Richard Walker Simultaneous multi-user document editing system
US20020198993A1 (en) 2000-09-01 2002-12-26 Ncr Corporation Downloading and uploading data in information networks
US20020103916A1 (en) 2000-09-07 2002-08-01 Benjie Chen Thwarting connection-based denial of service attacks
US20020032777A1 (en) 2000-09-11 2002-03-14 Yoko Kawata Load sharing apparatus and a load estimation method
US20080222223A1 (en) 2000-09-12 2008-09-11 Ibrix, Inc. Storage allocation in a distributed segmented file system
US7769711B2 (en) 2000-09-12 2010-08-03 Hewlett-Packard Development Company, L.P. Migration of control in a distributed segmented file system
US20070226331A1 (en) 2000-09-12 2007-09-27 Ibrix, Inc. Migration of control in a distributed segmented file system
US7406484B1 (en) 2000-09-12 2008-07-29 Tbrix, Inc. Storage allocation in a distributed segmented file system
US20020087887A1 (en) 2000-09-19 2002-07-04 Busam Vincent R. Device-to-device network
US6804542B1 (en) 2000-09-22 2004-10-12 Telefonaktiebolaget Lm Ericsson (Publ) Sleep modes in peer-to-peer communications
US20040003266A1 (en) 2000-09-22 2004-01-01 Patchlink Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US20140040478A1 (en) 2000-09-26 2014-02-06 Brocade Communications Systems, Inc. Global server load balancing
US6850997B1 (en) 2000-09-27 2005-02-01 International Business Machines Corporation System, method, and program for determining the availability of paths to a device
US20020083067A1 (en) 2000-09-28 2002-06-27 Pablo Tamayo Enterprise web mining system and method
US6801960B1 (en) 2000-09-28 2004-10-05 Emc Corporation Switch-based acceleration of computer data storage employing aggregations of disk arrays
US6959394B1 (en) 2000-09-29 2005-10-25 Intel Corporation Splitting knowledge of a password
US7139792B1 (en) 2000-09-29 2006-11-21 Intel Corporation Mechanism for locking client requests to a particular server
US7007092B2 (en) 2000-10-05 2006-02-28 Juniper Networks, Inc. Connection management system and method
US20110066718A1 (en) 2000-10-18 2011-03-17 Susai Michel K Apparatus, method and computer program product for efficiently pooling connections between clients and servers
US7801978B1 (en) 2000-10-18 2010-09-21 Citrix Systems, Inc. Apparatus, method and computer program product for efficiently pooling connections between clients and servers
US20020087571A1 (en) 2000-10-20 2002-07-04 Kevin Stapel System and method for dynamic generation of structured documents
US20020133491A1 (en) 2000-10-26 2002-09-19 Prismedia Networks, Inc. Method and system for managing distributed content and related metadata
US7165095B2 (en) 2000-10-26 2007-01-16 Intel Corporation Method and apparatus for distributing large payload file to a plurality of storage devices in a network
US20020083118A1 (en) 2000-10-26 2002-06-27 Sim Siew Yong Method and apparatus for managing a plurality of servers in a content delivery network
US20020087744A1 (en) 2000-11-01 2002-07-04 Aeroflex Altair Cybernetics Corporation Information transformation software engine
US20040111523A1 (en) 2000-11-02 2004-06-10 Howard Hall Tcp/udp acceleration
US6985956B2 (en) 2000-11-02 2006-01-10 Sun Microsystems, Inc. Switching system
WO2002039696A2 (en) 2000-11-03 2002-05-16 The Board Of Regents Of The University Of Nebraska Assured quality-of-service request scheduling
US6986040B1 (en) 2000-11-03 2006-01-10 Citrix Systems, Inc. System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US20020194112A1 (en) 2000-11-17 2002-12-19 Depinto Robert System and method for exchanging creative content
US6975592B1 (en) 2000-11-22 2005-12-13 Nortel Networks Limited Configurable rule-engine for layer-7 and traffic characteristic-based classification
US20020099829A1 (en) 2000-11-27 2002-07-25 Richards Kenneth W. Filter proxy system and method
US6914881B1 (en) 2000-11-28 2005-07-05 Nortel Networks Ltd Prioritized continuous-deficit round robin scheduling
US20020065810A1 (en) 2000-11-29 2002-05-30 Bradley Mark W. File system translators and methods for implementing the same
US6871245B2 (en) 2000-11-29 2005-03-22 Radiant Data Corporation File system translators and methods for implementing the same
US7236491B2 (en) 2000-11-30 2007-06-26 Industrial Technology Research Institute Method and apparatus for scheduling for packet-switched networks
US20070233826A1 (en) 2000-12-06 2007-10-04 Tindal Glen D System and method for configuration, management and monitoring of network resources
US7003533B2 (en) 2000-12-12 2006-02-21 Matsushita Electric Industrial Co., Ltd. File management method, content recording/playback apparatus and content recording program
US20020073105A1 (en) 2000-12-12 2002-06-13 Matsushita Electric Industrial Co., File management method, content recording/playback apparatus and content recording program
US7133863B2 (en) 2000-12-28 2006-11-07 Intel Corporation Method and apparatus to search for information
US7512673B2 (en) 2001-01-11 2009-03-31 Attune Systems, Inc. Rule based aggregation of files and transactions in a switched file system
US7509322B2 (en) 2001-01-11 2009-03-24 F5 Networks, Inc. Aggregated lock management for locking aggregated files in a switched file system
US7788335B2 (en) 2001-01-11 2010-08-31 F5 Networks, Inc. Aggregated opportunistic lock and aggregated implicit lock management for locking aggregated files in a switched file system
US7562110B2 (en) 2001-01-11 2009-07-14 F5 Networks, Inc. File switch and switched file system
US20090106255A1 (en) 2001-01-11 2009-04-23 Attune Systems, Inc. File Aggregation in a Switched File System
US6889249B2 (en) 2001-01-11 2005-05-03 Z-Force, Inc. Transaction aggregation in a switched file system
US7580971B1 (en) 2001-01-11 2009-08-25 Oracle International Corporation Method and apparatus for efficient SQL processing in an n-tier architecture
US20060080353A1 (en) 2001-01-11 2006-04-13 Vladimir Miloushev Directory aggregation for files distributed over a plurality of servers in a switched file system
US7383288B2 (en) 2001-01-11 2008-06-03 Attune Systems, Inc. Metadata based file switch and switched file system
US8005953B2 (en) 2001-01-11 2011-08-23 F5 Networks, Inc. Aggregated opportunistic lock and aggregated implicit lock management for locking aggregated files in a switched file system
WO2002056181A2 (en) 2001-01-11 2002-07-18 Force Communications Inc Z File switch and switched file system
US7003564B2 (en) 2001-01-17 2006-02-21 Hewlett-Packard Development Company, L.P. Method and apparatus for customizably calculating and displaying health of a computer network
US6990547B2 (en) 2001-01-29 2006-01-24 Adaptec, Inc. Replacing file system processors by hot swapping
US6990667B2 (en) 2001-01-29 2006-01-24 Adaptec, Inc. Server-independent object positioning for load balancing drives and servers
US20020162118A1 (en) 2001-01-30 2002-10-31 Levy Kenneth L. Efficient interactive TV
US20020103823A1 (en) 2001-02-01 2002-08-01 International Business Machines Corporation Method and system for extending the performance of a web crawler
US20020112061A1 (en) 2001-02-09 2002-08-15 Fu-Tai Shih Web-site admissions control with denial-of-service trap for incomplete HTTP requests
US20020156905A1 (en) 2001-02-21 2002-10-24 Boris Weissman System for logging on to servers through a portal computer
US6469983B2 (en) 2001-02-26 2002-10-22 Maple Optical Systems, Inc. Data packet transmission scheduling using a partitioned heap
US20020160161A1 (en) 2001-02-28 2002-10-31 Canon Kabushiki Kaisha Recording medium, image-forming Method employing the same, process for producing the same
US20020133330A1 (en) 2001-03-13 2002-09-19 Microsoft Corporation Provisioning computing services via an on-line networked computing environment
US6775679B2 (en) 2001-03-20 2004-08-10 Emc Corporation Building a meta file system from file system cells
US7401220B2 (en) 2001-03-21 2008-07-15 Microsoft Corporation On-disk file format for a serverless distributed file system
US20020138615A1 (en) 2001-03-21 2002-09-26 Schmeling Garth F. System and method for device management through world wide web confederacy
US7415608B2 (en) 2001-03-21 2008-08-19 Microsoft Corporation On-disk file format for a serverless distributed file system
US6990114B1 (en) 2001-03-26 2006-01-24 Advanced Micro Devices, Inc. System and method for deciding outgoing priority for data frames
US20020143909A1 (en) 2001-03-27 2002-10-03 International Business Machines Corporation Apparatus and method for managing multiple user identities on a networked computer system
US20090141891A1 (en) 2001-03-27 2009-06-04 Microsoft Corporation Distributed scalable cryptographic access control
US6928082B2 (en) 2001-03-28 2005-08-09 Innomedia Pte Ltd System and method for determining a connectionless communication path for communicating audio data through an address and port translation device
US7006981B2 (en) 2001-04-04 2006-02-28 Profitlogic, Inc. Assortment decisions
US20020147630A1 (en) 2001-04-04 2002-10-10 Rose Dawn M. Assortment decisions
US20020150253A1 (en) 2001-04-12 2002-10-17 Brezak John E. Methods and arrangements for protecting information in forwarded authentication messages
US7305480B2 (en) 2001-04-18 2007-12-04 Hitachi, Ltd. Method and system for persistent translation between protocols
US20020161911A1 (en) 2001-04-19 2002-10-31 Thomas Pinckney Systems and methods for efficient memory allocation for streaming of multimedia files
US6839761B2 (en) 2001-04-19 2005-01-04 Microsoft Corporation Methods and systems for authentication through multiple proxy servers that require different authentication data
US6996841B2 (en) 2001-04-19 2006-02-07 Microsoft Corporation Negotiating secure connections through a proxy server
US20070233809A1 (en) 2001-04-20 2007-10-04 Egenera, Inc. Reconfigurable, virtual processing system, cluster, network and method
US20020161913A1 (en) 2001-04-30 2002-10-31 Manuel Gonzalez System and method for performing a download
US6553352B2 (en) 2001-05-04 2003-04-22 Demand Tec Inc. Interface for merchandise price optimization
US7065482B2 (en) 2001-05-17 2006-06-20 International Business Machines Corporation Internet traffic analysis tool
US20020174216A1 (en) 2001-05-17 2002-11-21 International Business Machines Corporation Internet traffic analysis tool
US20020188667A1 (en) 2001-05-25 2002-12-12 Ilya Kirnos Management and synchronization application for network file system
US7711771B2 (en) 2001-05-25 2010-05-04 Oracle International Corporation Management and synchronization application for network file system
US20030028514A1 (en) 2001-06-05 2003-02-06 Lord Stephen Philip Extended attribute caching in clustered filesystem
US7689710B2 (en) 2001-06-12 2010-03-30 Hewlett-Packard Development Company, L.P. Method and system for a front-end modular transmission control protocol (TCP) handoff design in a streams based transmission control protocol/internet protocol (TCP/IP) implementation
US20060031374A1 (en) 2001-06-18 2006-02-09 Transtech Networks Usa, Inc. Packet switch and method thereof dependent on application content
US20020194342A1 (en) 2001-06-18 2002-12-19 Transtech Networks Usa, Inc. Content-aware application switch and methods thereof
US7113993B1 (en) 2001-06-20 2006-09-26 Microstrategy, Inc. Technique for handling server session requests in a system having a plurality of servers
US20030009429A1 (en) 2001-06-21 2003-01-09 Jameson Kevin Wade Collection installable knowledge
US7020644B2 (en) 2001-06-21 2006-03-28 Kevin Wade Jameson Collection installable knowledge
US20020198956A1 (en) 2001-06-25 2002-12-26 International Business Machines Corporation Method and apparatus for managing a cache
US20030009528A1 (en) 2001-07-08 2003-01-09 Imran Sharif System and method for using an internet appliance to send/receive digital content files as E-mail attachments
US20030018450A1 (en) 2001-07-16 2003-01-23 Stephen Carley System and method for providing composite variance analysis for network operation
US20040138858A1 (en) 2001-07-16 2004-07-15 Cable & Wireless Internet Services, Inc. System and method for providing composite variance analysis for network operation
US20030018585A1 (en) 2001-07-21 2003-01-23 International Business Machines Corporation Method and system for the communication of assured reputation information
US20030037070A1 (en) 2001-07-31 2003-02-20 Firstlook.Com. Streaming media security system
US7146524B2 (en) 2001-08-03 2006-12-05 Isilon Systems, Inc. Systems and methods for providing a distributed file system incorporating a virtual hot spare
US20030033308A1 (en) 2001-08-03 2003-02-13 Patel Sujal M. System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system
US20040151186A1 (en) 2001-08-08 2004-08-05 Katsuaki Akama Server, mobile communication terminal, radio apparatus, communication method in communication system and communication system
US6728704B2 (en) 2001-08-27 2004-04-27 Verity, Inc. Method and apparatus for merging result lists from multiple search engines
US20060259320A1 (en) 2001-08-30 2006-11-16 Accenture Global Services Gmbh Transitive trust network
US6654701B2 (en) 2001-08-30 2003-11-25 Spirent Communications Method and apparatus for measuring protocol performance in a data communication network
US20040236798A1 (en) 2001-09-11 2004-11-25 Sudhir Srinivasan Migration of control in a distributed segmented file system
US7020699B2 (en) 2001-09-11 2006-03-28 Sun Microsystems, Inc. Test result analyzer in a distributed processing framework system and methods for implementing the same
US20030067923A1 (en) * 2001-09-11 2003-04-10 Samsung Electronics Co., Ltd. Method for providing packet data service in a wireless communication system
US20030055723A1 (en) 2001-09-20 2003-03-20 Paul English Vendor comparison, advertising and switching
US7039061B2 (en) 2001-09-25 2006-05-02 Intel Corporation Methods and apparatus for retaining packet order in systems utilizing multiple transmit queues
US6985936B2 (en) 2001-09-27 2006-01-10 International Business Machines Corporation Addressing the name space mismatch between content servers and content caching systems
US20030061240A1 (en) 2001-09-27 2003-03-27 Emc Corporation Apparatus, method and system for writing data to network accessible file system while minimizing risk of cache data loss/ data corruption
US20030065951A1 (en) 2001-09-28 2003-04-03 Satoshi Igeta Information providing server, terminal apparatus, control method therefor, and information providing system
US20030065956A1 (en) 2001-09-28 2003-04-03 Abhijit Belapurkar Challenge-response data communication protocol
US20030086415A1 (en) 2001-10-02 2003-05-08 Bernhard Urs Peter Method for filtering redundant data packets
US7051112B2 (en) 2001-10-02 2006-05-23 Tropic Networks Inc. System and method for distribution of software
US20030069974A1 (en) 2001-10-08 2003-04-10 Tommy Lu Method and apparatus for load balancing web servers and virtual web servers
US20030069918A1 (en) 2001-10-08 2003-04-10 Tommy Lu Method and apparatus for dynamic provisioning over a world wide web
US20030070069A1 (en) 2001-10-10 2003-04-10 Abhijit Belapurkar Authentication module for an enterprise access management system
US20030074434A1 (en) 2001-10-11 2003-04-17 Jason James L. Determination of message source in network communications
US7152184B2 (en) 2001-11-22 2006-12-19 Kabushiki Kaisha Toshiba Storage device, backup method and computer program code of this storage device
US20030105846A1 (en) 2001-11-30 2003-06-05 Koninklijke Philips Electronics N.V. Enhanched UDDI with service push model
US20030105983A1 (en) 2001-12-03 2003-06-05 Brakmo Lawrence Sivert Power reduction in computing devices using micro-sleep intervals
US6816977B2 (en) 2001-12-03 2004-11-09 Hewlett-Packard Development Company, L.P. Power reduction in computing devices using micro-sleep intervals
US7610390B2 (en) 2001-12-04 2009-10-27 Sun Microsystems, Inc. Distributed network identity
US20030149781A1 (en) 2001-12-04 2003-08-07 Peter Yared Distributed network identity
US6947985B2 (en) 2001-12-05 2005-09-20 Websense, Inc. Filtering techniques for managing access to internet sites or other software applications
US20050021615A1 (en) 2001-12-06 2005-01-27 Raidcore, Inc. File mode RAID subsystem
US20030108052A1 (en) 2001-12-06 2003-06-12 Rumiko Inoue Server load sharing system
US6782450B2 (en) 2001-12-06 2004-08-24 Raidcore, Inc. File mode RAID subsystem
US7054998B2 (en) 2001-12-06 2006-05-30 Broadcom Company File mode RAID subsystem
US7788408B2 (en) 2001-12-07 2010-08-31 Hitachi, Ltd. Address translator, message processing method and equipment
US8131863B2 (en) 2001-12-07 2012-03-06 Hitachi, Ltd. Address translator, message processing method and equipment
US9088525B2 (en) 2001-12-07 2015-07-21 Hitachi, Ltd. Address translator, message processing method and equipment
US8601161B2 (en) 2001-12-07 2013-12-03 Hitachi, Ltd. Address translator, message processing method and equipment
US7761597B2 (en) 2001-12-07 2010-07-20 Hitachi, Ltd. Address translator, message processing method and equipment
US6986015B2 (en) 2001-12-10 2006-01-10 Incipient, Inc. Fast path caching
US7173929B1 (en) 2001-12-10 2007-02-06 Incipient, Inc. Fast path for performing data operations
US7280536B2 (en) 2001-12-10 2007-10-09 Incipient, Inc. Fast path for performing data operations
US6959373B2 (en) 2001-12-10 2005-10-25 Incipient, Inc. Dynamic and variable length extents
US6973549B1 (en) 2001-12-10 2005-12-06 Incipient, Inc. Locking technique for control and synchronization
US7013379B1 (en) 2001-12-10 2006-03-14 Incipient, Inc. I/O primitives
US20030212954A1 (en) 2001-12-17 2003-11-13 Patrudu Pilla Gurumurty Conceptual process redactor
US7024427B2 (en) 2001-12-19 2006-04-04 Emc Corporation Virtual file system
US20030191812A1 (en) 2001-12-19 2003-10-09 International Business Machines Corporation Method and system for caching role-specific fragments
US20030115439A1 (en) 2001-12-19 2003-06-19 Hewlett Packard Company Updating references to a migrated object in a partition-based distributed file system
US20060123062A1 (en) 2001-12-19 2006-06-08 Emc Corporation Virtual file system
US6775672B2 (en) 2001-12-19 2004-08-10 Hewlett-Packard Development Company, L.P. Updating references to a migrated object in a partition-based distributed file system
US20030115218A1 (en) 2001-12-19 2003-06-19 Bobbitt Jared E. Virtual file system
US6775673B2 (en) 2001-12-19 2004-08-10 Hewlett-Packard Development Company, L.P. Logical volume-level migration in a partition-based distributed file system
US20030139934A1 (en) 2001-12-20 2003-07-24 Intel Corporation Requesting and providing services via a registry
US20050125195A1 (en) 2001-12-21 2005-06-09 Juergen Brendel Method, apparatus and sofware for network traffic management
US7185359B2 (en) 2001-12-21 2007-02-27 Microsoft Corporation Authentication and authorization across autonomous network systems
US20030130945A1 (en) 2002-01-08 2003-07-10 Bottomline Technologies (De) Inc. Electronic transaction processing server with trend based automated transaction evaluation
US20040215665A1 (en) 2002-01-09 2004-10-28 Edgar David A. System, method, and computer program product for providing accelerated and secure wireless data transmission over the internet
US20030128708A1 (en) 2002-01-10 2003-07-10 Rumiko Inoue Communication apparatus and relay apparatus for performing packet priority control
US7319696B2 (en) 2002-01-10 2008-01-15 Fujitsu Limited Communication apparatus and relay apparatus for performing packet priority control
US20030145062A1 (en) 2002-01-14 2003-07-31 Dipanshu Sharma Data conversion server for voice browsing system
US7558197B1 (en) 2002-01-17 2009-07-07 Juniper Networks, Inc. Dequeuing and congestion control systems and methods
US20030179755A1 (en) 2002-01-18 2003-09-25 Fraser Alexander Gibson System and method for handling prioritized data in a network
US20030140140A1 (en) 2002-01-18 2003-07-24 Jesse Lahtinen Monitoring the flow of a data stream
US7398552B2 (en) 2002-01-28 2008-07-08 Hughes Network Systems, Llc Method and system for integrating performance enhancing functions in a virtual private network (VPN)
US20030145233A1 (en) 2002-01-31 2003-07-31 Poletto Massimiliano Antonio Architecture to thwart denial of service attacks
US20030159072A1 (en) 2002-02-04 2003-08-21 Atreus Systems Corp. Single sign-on for multiple network -based services
US7321926B1 (en) 2002-02-11 2008-01-22 Extreme Networks Method of and system for allocating resources to resource requests
US7228359B1 (en) 2002-02-12 2007-06-05 Cisco Technology, Inc. Methods and apparatus for providing domain name service based on a client identifier
US20030156586A1 (en) 2002-02-19 2003-08-21 Broadcom Corporation Method and apparatus for flexible frame processing and classification engine
US20030163576A1 (en) 2002-02-28 2003-08-28 Bob Janssen Access-control method for a multi-user computer system
US7433962B2 (en) 2002-02-28 2008-10-07 Real Enterprise Solutions Development B.V. Multi-user computer system with an access balancing feature
US20060106882A1 (en) 2002-03-07 2006-05-18 Microsoft Corporation File Availability in Distributed File Storage Systems
US20030171978A1 (en) 2002-03-11 2003-09-11 Jenkins Margalyn Toi Efficient retail item assortment
US20030177364A1 (en) 2002-03-15 2003-09-18 Walsh Robert E. Method for authenticating users
US20030177388A1 (en) 2002-03-15 2003-09-18 International Business Machines Corporation Authenticated identity translation within a multiple computing unit environment
US20060112151A1 (en) 2002-03-19 2006-05-25 Manley Stephen L System and method for storage of snapshot metadata in a remote file
US7010553B2 (en) 2002-03-19 2006-03-07 Network Appliance, Inc. System and method for redirecting access to a remote mirrored snapshot
US7644109B2 (en) 2002-03-19 2010-01-05 Netapp, Inc. System and method for storage of snapshot metadata in a remote file
US6934706B1 (en) 2002-03-22 2005-08-23 International Business Machines Corporation Centralized mapping of security credentials for database access operations
US20030225485A1 (en) 2002-03-23 2003-12-04 Andreas Fritz Method and apparatus for accepting data
US20030195813A1 (en) 2002-04-11 2003-10-16 Kim Pallister System and method for automated auctioning of web services
US20040030627A1 (en) 2002-04-19 2004-02-12 Computer Associates Think, Inc. Web services broker
US7191163B2 (en) 2002-04-19 2007-03-13 Computer Associates Think, Inc. System and method for providing inferencing services
US7383570B2 (en) 2002-04-25 2008-06-03 Intertrust Technologies, Corp. Secure authentication systems and methods
US20030204635A1 (en) 2002-04-27 2003-10-30 Eun-Sook Ko Internet protocol based communication system and method for setting host address and selecting source address therein
US20040006575A1 (en) 2002-04-29 2004-01-08 Visharam Mohammed Zubair Method and apparatus for supporting advanced coding formats in media files
US7089491B2 (en) 2002-05-03 2006-08-08 Microsoft Corporation System and method for enhancing XML schemas
US20090138749A1 (en) 2002-05-15 2009-05-28 Broadcom Corporation Hypertransport/SPI-4 Interface Supporting Configurable Deskewing
US7490162B1 (en) 2002-05-15 2009-02-10 F5 Networks, Inc. Method and system for forwarding messages received at a traffic manager
US20030221000A1 (en) 2002-05-16 2003-11-27 Ludmila Cherkasova System and method for measuring web service performance using captured network packets
US20030220835A1 (en) 2002-05-23 2003-11-27 Barnes Melvin L. System, method, and computer program product for providing location based services and mobile e-commerce
US7328281B2 (en) 2002-05-30 2008-02-05 Hitachi, Ltd. Address translation equipment, terminal equipment and mobile communication method
US7941563B2 (en) 2002-05-30 2011-05-10 Hitachi, Ltd. Address translation equipment, terminal equipment and mobile communication method
US7162529B2 (en) 2002-05-30 2007-01-09 Hitachi, Ltd. System using mobile proxy for intercepting mobile IP message and performing protocol translation to support multiple communication protocols between mobile networks
US20040098383A1 (en) 2002-05-31 2004-05-20 Nicholas Tabellion Method and system for intelligent storage management
US8130650B2 (en) 2002-06-03 2012-03-06 International Business Machines Corporation Retro flow control for arriving traffic in computer networks
US20110273984A1 (en) 2002-06-10 2011-11-10 Qualcomm Incorporated Packet Flow Processing in a Communication System
US20030229665A1 (en) 2002-06-10 2003-12-11 International Business Machines Corporation Systems, methods and computer programs for implementing and accessing web services
US20080253395A1 (en) 2002-06-11 2008-10-16 Pandya Ashish A Tcp/ip processor and engine using rdma
US20040015783A1 (en) 2002-06-20 2004-01-22 Canon Kabushiki Kaisha Methods for interactively defining transforms and for generating queries by manipulating existing query data
US20030236995A1 (en) 2002-06-21 2003-12-25 Fretwell Lyman Jefferson Method and apparatus for facilitating detection of network intrusion
US20040003287A1 (en) 2002-06-28 2004-01-01 Zissimopoulos Vasileios Bill Method for authenticating kerberos users from common web browsers
US20050188220A1 (en) 2002-07-01 2005-08-25 Mikael Nilsson Arrangement and a method relating to protection of end user data
US20040006591A1 (en) 2002-07-05 2004-01-08 Fujitsu Limited Information sharing method, information sharing device, and information sharing computer product
US20040010654A1 (en) 2002-07-15 2004-01-15 Yoshiko Yasuda System and method for virtualizing network storages into a single file system view
US7587471B2 (en) 2002-07-15 2009-09-08 Hitachi, Ltd. System and method for virtualizing network storages into a single file system view
US20040192312A1 (en) 2002-07-16 2004-09-30 Jia-Ru Li Communication system for voice and data with wireless TCP server
US20040017825A1 (en) 2002-07-26 2004-01-29 Kenneth Stanwood Scheduling method and system for communication systems that offer multiple classes of service
US20040025013A1 (en) 2002-07-30 2004-02-05 Imagictv Inc. Secure multicast flow
US20040030857A1 (en) 2002-07-31 2004-02-12 Brocade Communications Systems, Inc. Hardware-based translating virtualization switch
US20040028043A1 (en) 2002-07-31 2004-02-12 Brocade Communications Systems, Inc. Method and apparatus for virtualizing storage devices inside a storage area network fabric
US20040028063A1 (en) 2002-07-31 2004-02-12 Brocade Communications Systems, Inc. Host bus adaptor-based virtualization switch
US7743035B2 (en) 2002-08-09 2010-06-22 Netapp, Inc. System and method for restoring a virtual disk from a snapshot
US20060242179A1 (en) 2002-08-09 2006-10-26 Chen Raymond C System and method for restoring a virtual disk from a snapshot
US20040030740A1 (en) 2002-08-09 2004-02-12 Stelting Stephen A. Method and system for automating generation of web services from existing service components
US20040043758A1 (en) 2002-08-29 2004-03-04 Nokia Corporation System and method for providing context sensitive recommendations to digital services
US7343398B1 (en) 2002-09-04 2008-03-11 Packeteer, Inc. Methods, apparatuses and systems for transparently intermediating network traffic over connection-based authentication protocols
US7058633B1 (en) 2002-09-09 2006-06-06 Cisco Technology, Inc. System and method for generalized URL-rewriting
US7120746B2 (en) 2002-09-09 2006-10-10 International Business Machines Corporation Technique for data transfer
US6847970B2 (en) 2002-09-11 2005-01-25 International Business Machines Corporation Methods and apparatus for managing dependencies in distributed systems
US20040054777A1 (en) 2002-09-16 2004-03-18 Emmanuel Ackaouy Apparatus and method for a proxy cache
US7171496B2 (en) 2002-09-24 2007-01-30 Sharp Kabushiki Kaisha Data bus width conversion apparatus and data processing apparatus
US20040064544A1 (en) 2002-09-26 2004-04-01 International Business Machines Corporation Coverage analysis of program code that accesses a database
US20040064554A1 (en) 2002-09-26 2004-04-01 Kuno Harumi Anne Network service system and mechanism for searching service registries
US7328009B2 (en) 2002-09-26 2008-02-05 Hitachi, Ltd. Method and apparatus for mobile communication utilizing load balancing
US20040072569A1 (en) 2002-10-07 2004-04-15 Ntt Docomo, Inc. Mobile communication system, mobile terminal transfer device, and mobile communication method
US20060112272A1 (en) 2002-10-17 2006-05-25 Yoshihiro Morioka Packet transmission/reception device
US7228422B2 (en) 2002-10-17 2007-06-05 Matsushita Electric Industrial Co., Ltd. Packet transmission/reception device
US20060112367A1 (en) 2002-10-24 2006-05-25 Robert Harris Method and system for ranking services in a web services architecture
US20040148380A1 (en) 2002-10-28 2004-07-29 Richard Meyer Method and system for dynamic expansion and contraction of nodes in a storage area network
US7752294B2 (en) 2002-10-28 2010-07-06 Netapp, Inc. Method and system for dynamic expansion and contraction of nodes in a storage area network
US7076689B2 (en) 2002-10-29 2006-07-11 Brocade Communication Systems, Inc. Use of unique XID range among multiple control processors
US7023974B1 (en) 2002-10-31 2006-04-04 America Online, Inc. Compression of electronic communications
US20040141185A1 (en) 2002-11-04 2004-07-22 Hill Henry A. Compensation of refractivity perturbations in an interferometer path
US20040093474A1 (en) 2002-11-06 2004-05-13 Alvis Lin Snapshot facility allowing preservation of chronological views on block drives
US20040139355A1 (en) 2002-11-07 2004-07-15 Axel David J. Method and system of accessing a plurality of network elements
US20040153479A1 (en) 2002-11-14 2004-08-05 Mikesell Paul A. Systems and methods for restriping files in a distributed file system
US7475241B2 (en) 2002-11-22 2009-01-06 Cisco Technology, Inc. Methods and apparatus for dynamic session key generation and rekeying in mobile IP
US20040117493A1 (en) 2002-11-28 2004-06-17 International Business Machines Corporation Method and system for accessing internet resources through a proxy using the form-based authentication
US20040111621A1 (en) 2002-12-05 2004-06-10 Microsoft Corporation Methods and systems for authentication of a user for sub-locations of a network location
US6961815B2 (en) 2002-12-05 2005-11-01 International Business Machines Corporation Multiple disk data storage system for reducing power consumption
US7409440B1 (en) 2002-12-12 2008-08-05 F5 Net Works, Inc. User defined data items
US7296263B1 (en) 2002-12-12 2007-11-13 F5 Networks, Inc. Method and system for performing operations on data using XML streams
US7308703B2 (en) 2002-12-18 2007-12-11 Novell, Inc. Protection of data accessible by a mobile device
US20040123277A1 (en) 2002-12-18 2004-06-24 Schrader Stuart Lyle Method, system and computer product for parsing binary data
US20040133605A1 (en) 2002-12-20 2004-07-08 Chang Hyun Sung System and method for authoring multimedia contents description metadata
US20040122926A1 (en) 2002-12-23 2004-06-24 Microsoft Corporation, Redmond, Washington. Reputation system for web services
AU2003300350A1 (en) 2003-01-02 2004-07-29 Attune Systems, Inc. Metadata based file switch and switched file system
WO2004061605A2 (en) 2003-01-02 2004-07-22 Attune Systems, Inc. Medata based file switch and switched file system
US20040133606A1 (en) 2003-01-02 2004-07-08 Z-Force Communications, Inc. Directory aggregation for files distributed over a plurality of servers in a switched file system
CA2512312A1 (en) 2003-01-02 2004-07-22 Attune Systems, Inc. Metadata based file switch and switched file system
US20050021736A1 (en) 2003-01-07 2005-01-27 International Business Machines Corporation Method and system for monitoring performance of distributed applications
US7877511B1 (en) 2003-01-13 2011-01-25 F5 Networks, Inc. Method and apparatus for adaptive services networking
US7394804B2 (en) 2003-01-22 2008-07-01 Hitachi, Ltd. Message conversion server and IP telephone
US7133944B2 (en) 2003-02-04 2006-11-07 Samsung Electronics, Co., Ltd. Media access controller with power-save mode
US20050175013A1 (en) 2003-02-24 2005-08-11 Jean-Francois Le Pennec Method for transmitting high-priority packets in an IP transmission network
US7324533B1 (en) 2003-02-25 2008-01-29 Cisco Technology, Inc. Using modem profiles to improve connectivity, connect timing, and compression performance on a modem relay (MR) gateway
US7287082B1 (en) 2003-03-03 2007-10-23 Cisco Technology, Inc. System using idle connection metric indicating a value based on connection characteristic for performing connection drop sequence
US7143146B2 (en) 2003-03-13 2006-11-28 Hitachi, Ltd. Method for accessing distributed file system
US20040181605A1 (en) 2003-03-13 2004-09-16 Hitachi, Ltd. Method for accessing distributed file system
US8819419B2 (en) 2003-04-03 2014-08-26 International Business Machines Corporation Method and system for dynamic encryption of a URL
US20140317404A1 (en) 2003-04-03 2014-10-23 International Business Machines Corporation Dynamic encryption of a universal resource locator
US20040199547A1 (en) 2003-04-07 2004-10-07 Marco Winter Database model for hierarchical data formats
US7457982B2 (en) 2003-04-11 2008-11-25 Network Appliance, Inc. Writable virtual disk of read-only snapshot file objects
US20060179261A1 (en) 2003-04-11 2006-08-10 Vijayan Rajan Writable read-only snapshots
US8069225B2 (en) 2003-04-14 2011-11-29 Riverbed Technology, Inc. Transparent client-server transaction accelerator
US20070130255A1 (en) 2003-04-17 2007-06-07 Lionel Wolovitz Data access, replication or communication system comprising a distributed software application
US7346664B2 (en) 2003-04-24 2008-03-18 Neopath Networks, Inc. Transparent file migration using namespace replication
US7072917B2 (en) 2003-04-24 2006-07-04 Neopath Networks, Inc. Extended storage capacity for a network file server
US20040213156A1 (en) 2003-04-25 2004-10-28 Alcatel Ip Networks, Inc. Assigning packet queue priority
US7299491B2 (en) * 2003-04-30 2007-11-20 Microsoft Corporation Authenticated domain name resolution
US7308475B1 (en) 2003-05-06 2007-12-11 F5 Networks, Inc. Method and system for accessing network services
US7133967B2 (en) 2003-05-09 2006-11-07 International Business Machines Corporation Storage system, controller, control method and program product therefor
US20040236826A1 (en) 2003-05-19 2004-11-25 Michael Harville Combination case for service location management of media services
US7315543B2 (en) 2003-05-19 2008-01-01 Hitachi Communications Technologies, Ltd. Apparatus and method for data communication on packet-switching network
US20050044213A1 (en) 2003-05-26 2005-02-24 Emiko Kobayashi Network traffic measurement system
US20050021703A1 (en) 2003-06-04 2005-01-27 Cherry Darrel D. Systems and methods for automatically configuring a client for remote use of a network-based service
US7653699B1 (en) 2003-06-12 2010-01-26 Symantec Operating Corporation System and method for partitioning a file system for enhanced availability and scalability
JP2005010913A (en) 2003-06-17 2005-01-13 Toshiba Corp Session management method
US20040267948A1 (en) 2003-06-27 2004-12-30 Oliver Neal C. Method and system for a network node for attachment to switch fabrics
US20040264472A1 (en) 2003-06-27 2004-12-30 Oliver Neal C. Method and system for open-loop congestion control in a system fabric
US20050055435A1 (en) 2003-06-30 2005-03-10 Abolade Gbadegesin Network load balancing with connection manipulation
US20040264481A1 (en) 2003-06-30 2004-12-30 Darling Christopher L. Network load balancing with traffic routing
US20040267920A1 (en) 2003-06-30 2004-12-30 Aamer Hydrie Flexible network load balancing
US20040268358A1 (en) 2003-06-30 2004-12-30 Microsoft Corporation Network load balancing with host status information
US20050004887A1 (en) 2003-07-02 2005-01-06 Nec Corporation Policy processing system and method
US8437345B2 (en) 2003-07-09 2013-05-07 Hitachi, Ltd. Terminal and communication system
US7831662B2 (en) 2003-07-11 2010-11-09 At&T Intellectual Property I, L.P. Multi-user database system and method for resource usage tracking
US20050028010A1 (en) 2003-07-29 2005-02-03 International Business Machines Corporation System and method for addressing denial of service virus attacks
US7526541B2 (en) 2003-07-29 2009-04-28 Enterasys Networks, Inc. System and method for dynamic network policy management
US20050027869A1 (en) 2003-07-31 2005-02-03 International Business Machines Corporation Method, system and program product for asynchronously processing requests
US20050027841A1 (en) 2003-08-01 2005-02-03 Rolfe Edward G. Programmable remote device management system for locally or remotely controlling and/or configuring a communication network switch
US7953701B2 (en) 2003-08-08 2011-05-31 Hitachi, Ltd. Method of controlling total disk usage amount in virtualized and unified network storage system
US20120066489A1 (en) 2003-08-08 2012-03-15 Keiko Ogawa Tcp/ip-based communication system and associated methodology providing an enhanced transport layer protocol
US20050117589A1 (en) 2003-08-13 2005-06-02 Cesar Douady Method and device for managing priority during the transmission of a message
US8665969B2 (en) 2003-08-14 2014-03-04 Broadcom Corporation System and method for generating pseudo MPEG information from digital video information
US20050052440A1 (en) 2003-08-22 2005-03-10 Samsung Electronics Co., Ltd. Apparatus for and method of processing display signal
US20090265396A1 (en) 2003-08-26 2009-10-22 Tamir Ram Method, system, and program for personal data management using content-based replication
US7849112B2 (en) 2003-09-03 2010-12-07 Emc Corporation Using a file handle for associating the file with a tree quota in a file server
US20050050107A1 (en) 2003-09-03 2005-03-03 Mane Virendra M. Using a file for associating the file with a tree quota in a file server
US20080010372A1 (en) 2003-10-01 2008-01-10 Robert Khedouri Audio visual player apparatus and system and method of content distribution using the same
US20050078604A1 (en) 2003-10-08 2005-04-14 Wai Yim Connectionless TCP/IP data exchange
US20050091214A1 (en) 2003-10-24 2005-04-28 Mircrosoft Corporation Internal object protection from application programs
US7155466B2 (en) 2003-10-27 2006-12-26 Archivas, Inc. Policy-based management of a redundant array of independent nodes
US7516492B1 (en) 2003-10-28 2009-04-07 Rsa Security Inc. Inferring document and content sensitivity from public account accessibility
US7333999B1 (en) 2003-10-30 2008-02-19 Arcsight, Inc. Expression editor
US7440982B2 (en) 2003-11-13 2008-10-21 Commvault Systems, Inc. System and method for stored data archive verification
US20050108575A1 (en) 2003-11-18 2005-05-19 Yung Chong M. Apparatus, system, and method for faciliating authenticated communication between authentication realms
US20090300161A1 (en) 2003-11-20 2009-12-03 F5 Networks, Inc. Method and system for using feedback in accessing network services
US20050114701A1 (en) 2003-11-21 2005-05-26 International Business Machines Corporation Federated identity management within a distributed portal server
US20050114291A1 (en) 2003-11-25 2005-05-26 International Business Machines Corporation System, method, and service for federating and optionally migrating a local file system into a distributed file system while preserving local access to existing data
US20070168320A1 (en) 2003-11-26 2007-07-19 Dhrubajyoti Borthakur System and method for detecting file content similarity within a file system
US20060010502A1 (en) 2003-11-26 2006-01-12 Hitachi, Ltd. Method and apparatus for setting access restriction information
US20050122977A1 (en) 2003-12-05 2005-06-09 Microsoft Corporation Efficient download mechanism for devices with limited local storage
US7234074B2 (en) 2003-12-17 2007-06-19 International Business Machines Corporation Multiple disk data storage system for reducing power consumption
US7293133B1 (en) 2003-12-31 2007-11-06 Veritas Operating Corporation Performing operations without requiring split mirrors in a multi-class file system
US20050154837A1 (en) 2004-01-12 2005-07-14 International Business Machines Corporation Method and apparatus for managing caching of data on a client
US20050189501A1 (en) 2004-01-23 2005-09-01 Mitsugu Sato Charged particle system and a method for measuring image magnification
US20050165656A1 (en) 2004-01-27 2005-07-28 Robert Frederick Providing a marketplace for web services
US7292541B1 (en) 2004-01-28 2007-11-06 Novell, Inc. Methods and systems for unnumbered network link discovery
US20050240664A1 (en) 2004-02-13 2005-10-27 Hon Hai Precision Industry Co., Ltd. System and method for configuring and managing a network device
US20050198234A1 (en) 2004-02-20 2005-09-08 Gteko, Ltd. System and unified setting interface for configuring network manageable devices
US20050188423A1 (en) 2004-02-24 2005-08-25 Covelight Systems, Inc. Methods, systems and computer program products for monitoring user behavior for a server application
US7624109B2 (en) 2004-02-27 2009-11-24 Texas Memory Systems, Inc. Distributed asynchronous ordered replication
US20050198310A1 (en) 2004-03-08 2005-09-08 Samsung Electronics Co., Ltd. Method of communicating with server having flexible address
US20050234928A1 (en) 2004-03-23 2005-10-20 Grand Central Communications, Inc. Synchronous interface to asynchronous processes
US20050213587A1 (en) 2004-03-26 2005-09-29 Samsung Electronics Co., Ltd. Apparatus and method for scheduling packets in a wireless communication system
US7295827B2 (en) 2004-03-31 2007-11-13 Intel Corporation Mobile station dynamic power saving control
US7477796B2 (en) 2004-04-09 2009-01-13 Nokia Corporation Method for preparing compressed image data file, image data compression device, and photographic device
US20060271598A1 (en) 2004-04-23 2006-11-30 Wong Thomas K Customizing a namespace in a decentralized storage environment
US7194579B2 (en) 2004-04-26 2007-03-20 Sun Microsystems, Inc. Sparse multi-component files
US20060031520A1 (en) 2004-05-06 2006-02-09 Motorola, Inc. Allocation of common persistent connections through proxies
US20050262238A1 (en) 2004-05-07 2005-11-24 Zeus Technology Limited Tolerating failure of traffic management systems
US20050277430A1 (en) 2004-05-11 2005-12-15 Armin Meisl Intelligent mobile messaging and communication traffic Hub (iHub)
US20050256806A1 (en) 2004-05-12 2005-11-17 Alan Tien Method and system to facilitate securely processing a payment for an online transaction
US7624424B2 (en) 2004-05-21 2009-11-24 Nec Corporation Access control system, access control method, and access control program
US20060047785A1 (en) 2004-06-18 2006-03-02 Hon Hai Precision Industry Co., Ltd. System and method for configuring and managing communication devices
US20050289111A1 (en) 2004-06-25 2005-12-29 Tribble Guy L Method and apparatus for processing metadata
US20050289109A1 (en) 2004-06-25 2005-12-29 Yan Arrouye Methods and systems for managing data
US7778187B2 (en) 2004-06-29 2010-08-17 Damaka, Inc. System and method for dynamic stability in a peer-to-peer hybrid communications network
US7505795B1 (en) 2004-07-07 2009-03-17 Advanced Micro Devices, Inc. Power save management with customized range for user configuration and tuning value based upon recent usage
US7437478B2 (en) 2004-07-12 2008-10-14 Hitachi, Ltd. Priority control device
US8351333B2 (en) 2004-07-23 2013-01-08 Citrix Systems, Inc. Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements
US7724657B2 (en) 2004-07-23 2010-05-25 Citrix Systems, Inc. Systems and methods for communicating a lossy protocol via a lossless protocol
US7519813B1 (en) 2004-08-02 2009-04-14 Network Appliance, Inc. System and method for a sidecar authentication mechanism
US20060045096A1 (en) 2004-09-01 2006-03-02 International Business Machines Corporation Method, system, and computer product for controlling input message priority
US20060059267A1 (en) 2004-09-13 2006-03-16 Nokia Corporation System, method, and device for downloading content using a second transport protocol within a generic content download protocol
US7284150B2 (en) 2004-09-22 2007-10-16 International Business Machines Corporation System and method for reliably storing data and providing efficient incremental backup and asynchronous mirroring by preferentially handling new data
US20060075475A1 (en) 2004-10-01 2006-04-06 Grand Central Communications, Inc. Application identity design
US7590732B2 (en) 2004-10-08 2009-09-15 Telefonaktiebolaget Lm Ericsson (Publ) Enhancement of AAA routing originated from a local access network involving intermediary network preferences
US7574433B2 (en) 2004-10-08 2009-08-11 Paterra, Inc. Classification-expanded indexing and retrieval of classified documents
US20060077902A1 (en) 2004-10-08 2006-04-13 Kannan Naresh K Methods and apparatus for non-intrusive measurement of delay variation of data traffic on communication networks
US20060095573A1 (en) 2004-11-01 2006-05-04 Microsoft Corporation Delayed HTTP response
US20060129684A1 (en) 2004-11-10 2006-06-15 Chutney Technologies, Inc. Apparatus and method for distributing requests across a cluster of application servers
US20060135198A1 (en) 2004-11-15 2006-06-22 Lg Electronics Inc. Method for managing resources in mobile terminal
US7610307B2 (en) 2004-11-30 2009-10-27 Microsoft Corporation Method and system of detecting file system namespace changes and restoring consistency
US20100161774A1 (en) * 2004-12-01 2010-06-24 Yih Huang Self-Cleansing Secure DNS Server
US7644137B2 (en) 2004-12-14 2010-01-05 Sap Ag Workload balancing in environments with multiple clusters of application servers
US7831639B1 (en) 2004-12-22 2010-11-09 Symantec Operating Corporation System and method for providing data protection by using sparse files to represent images of data stored in block devices
US20060140193A1 (en) 2004-12-29 2006-06-29 Nokia Corporation Optimization of a TCP connection
US7415488B1 (en) 2004-12-31 2008-08-19 Symantec Operating Corporation System and method for redundant storage consistency recovery
US7500269B2 (en) 2005-01-07 2009-03-03 Cisco Technology, Inc. Remote access to local content using transcryption of digital rights management schemes
US20060156416A1 (en) 2005-01-07 2006-07-13 Huotari Allen J Remote access to local content using transcryption of digital rights management schemes
US20060153201A1 (en) 2005-01-12 2006-07-13 Thomson Licensing Method for assigning a priority to a data transfer in a network, and network node using the method
US20060161577A1 (en) 2005-01-19 2006-07-20 Microsoft Corporation Load balancing based on cache content
US20110087696A1 (en) 2005-01-20 2011-04-14 F5 Networks, Inc. Scalable system for partitioning and accessing metadata over multiple servers
US7885970B2 (en) 2005-01-20 2011-02-08 F5 Networks, Inc. Scalable system for partitioning and accessing metadata over multiple servers
US20060167838A1 (en) 2005-01-21 2006-07-27 Z-Force Communications, Inc. File-based hybrid file storage scheme supporting multiple file switches
US20060171365A1 (en) 2005-02-02 2006-08-03 Utstarcom, Inc. Method and apparatus for L2TP dialout and tunnel switching
US7958347B1 (en) 2005-02-04 2011-06-07 F5 Networks, Inc. Methods and apparatus for implementing authentication
US20080201599A1 (en) 2005-02-11 2008-08-21 Ferraiolo Frank D Combined alignment scrambler function for elastic interface
US7913053B1 (en) 2005-02-15 2011-03-22 Symantec Operating Corporation System and method for archival of messages in size-limited containers and separate archival of attachments in content addressable storage
US7930365B2 (en) 2005-02-16 2011-04-19 Cisco Technology, Inc. Method and apparatus to modify network identifiers at data servers
US20080271132A1 (en) 2005-02-18 2008-10-30 Telefonaktiebolaget Lm Ericsson (Publ) Host Identity Protocol Method and Apparatus
US20060190496A1 (en) 2005-02-21 2006-08-24 Canon Kabushiki Kaisha Data transmission device and method for controlling the same and image reading apparatus using the same
US7689596B2 (en) 2005-02-21 2010-03-30 Canon Kabushiki Kaisha Data transmission device and method for controlling the same and image reading apparatus using the same
WO2006091040A1 (en) 2005-02-24 2006-08-31 Lg Electronics Inc. Layer structure of network control protocol and interface method
US20060200470A1 (en) 2005-03-03 2006-09-07 Z-Force Communications, Inc. System and method for managing small-size files in an aggregated file system
US20060209853A1 (en) 2005-03-16 2006-09-21 Minoru Hidaka Packet transfer device and transfer control method thereof
US20060212746A1 (en) 2005-03-21 2006-09-21 Augustine Amegadzie Selection of migration methods including partial read restore in distributed storage management
US7908314B2 (en) 2005-03-23 2011-03-15 Hitachi, Ltd. Method for controlling a management computer
US7620733B1 (en) * 2005-03-30 2009-11-17 Cisco Technology, Inc. DNS anti-spoofing using UDP
US20060224687A1 (en) 2005-03-31 2006-10-05 Popkin Laird A Method and apparatus for offline cooperative file distribution using cache nodes
US20060230148A1 (en) 2005-04-06 2006-10-12 John Forecast TCP forwarding of client requests of high-level file and storage access protocols in a network file server system
US20060230265A1 (en) 2005-04-08 2006-10-12 Ravi Krishna Cookie-based acceleration of an authentication protocol
US20060233106A1 (en) 2005-04-14 2006-10-19 Microsoft Corporation Stateless, affinity-preserving load balancing
US7808913B2 (en) 2005-04-15 2010-10-05 New Jersey Institute Of Technology Dynamic bandwidth allocation and service differentiation for broadband passive optical networks
US20060242300A1 (en) 2005-04-25 2006-10-26 Hitachi, Ltd. Load balancing server and system
US20060282442A1 (en) 2005-04-27 2006-12-14 Canon Kabushiki Kaisha Method of learning associations between documents and data sets
US20060268692A1 (en) 2005-05-31 2006-11-30 Bellsouth Intellectual Property Corp. Transmission of electronic packets of information of varying priorities over network transports while accounting for transmission delays
US20060277225A1 (en) 2005-06-07 2006-12-07 Mark Timothy W Converting file system metadata structure while the file system remains available
US7467158B2 (en) 2005-06-10 2008-12-16 Microsoft Corporation Object virtualization
US20060282461A1 (en) 2005-06-10 2006-12-14 Microsoft Corporation Object virtualization
US20060282471A1 (en) 2005-06-13 2006-12-14 Mark Timothy W Error checking file system metadata while the file system remains available
US20060288413A1 (en) 2005-06-17 2006-12-21 Fujitsu Limited Intrusion detection and prevention system
US20110173295A1 (en) 2005-06-22 2011-07-14 Mark Bakke Offload stack for network, block and file input and output
US7209759B1 (en) 2005-06-23 2007-04-24 Cisco Technology, Inc. Method and system for customizing distributed short message routing
US20070005807A1 (en) 2005-06-29 2007-01-04 Symbian Software Limited Delta code messaging
US20070024919A1 (en) 2005-06-29 2007-02-01 Wong Chi M Parallel filesystem traversal for transparent mirroring of directories and files
US20070006293A1 (en) 2005-06-30 2007-01-04 Santosh Balakrishnan Multi-pattern packet content inspection mechanisms employing tagged values
US20080133518A1 (en) 2005-07-01 2008-06-05 Harsh Kapoor Systems and methods for processing data flows
US20080229415A1 (en) 2005-07-01 2008-09-18 Harsh Kapoor Systems and methods for processing data flows
US20070016662A1 (en) 2005-07-13 2007-01-18 Desai Aditya A Method and system for dynamically rebalancing client sessions within a cluster of servers connected to a network
US20080034136A1 (en) 2005-07-14 2008-02-07 Jonas Ulenas Method and apparatus for protocol and code converter
US20070016613A1 (en) 2005-07-15 2007-01-18 Stefano Foresti System and method for data transport
US20080209073A1 (en) 2005-07-22 2008-08-28 International Business Machines Corporation Adaptive Session Compression Management Method, Compression Manager and Session Management
US7571168B2 (en) 2005-07-25 2009-08-04 Parascale, Inc. Asynchronous file replication and migration in a storage network
US7599941B2 (en) 2005-07-25 2009-10-06 Parascale, Inc. Transparent redirection and load-balancing in a storage network
US20070027935A1 (en) 2005-07-28 2007-02-01 Haselton William R Backing up source files in their native file formats to a target storage
US7694082B2 (en) 2005-07-29 2010-04-06 International Business Machines Corporation Computer program and method for managing resources in a distributed storage system
US20070028068A1 (en) 2005-07-29 2007-02-01 International Business Machines Corporation System and method for managing resources in a distributed storage system
US20070027929A1 (en) 2005-08-01 2007-02-01 Whelan Gary J System, method, and/or computer program product for a file system interface
US20070058670A1 (en) 2005-08-08 2007-03-15 American Megatrends, Inc. UDP to TCP bridge
US20090119504A1 (en) 2005-08-10 2009-05-07 Riverbed Technology, Inc. Intercepting and split-terminating authenticated communication connections
US20100011434A1 (en) 2005-08-19 2010-01-14 Rony Kay Apparatus and method for associating categorization information with network traffic to facilitate application level processing
US8665868B2 (en) 2005-08-19 2014-03-04 Cpacket Networks, Inc. Apparatus and method for enhancing forwarding and classification of network traffic with prioritized matching and categorization
US8819109B1 (en) 2005-09-01 2014-08-26 At&T Intellectual Property Ii, L.P. Data network communication using identifiers mappable to resource locators
US20090125625A1 (en) 2005-09-15 2009-05-14 Jeong-Min Shim Load Balancing Method and Apparatus, and Software Streaming System Using the Same
US20070118879A1 (en) 2005-09-20 2007-05-24 Lg Electronics Inc. Security protocol model for ubiquitous networks
US20070064661A1 (en) 2005-09-21 2007-03-22 Kapil Sood Method, apparatus and system for maintaining mobility resistant IP tunnels using a mobile router
US20070136308A1 (en) 2005-09-30 2007-06-14 Panagiotis Tsirigotis Accumulating access frequency and file attributes for supporting policy based storage management
US20070088702A1 (en) 2005-10-03 2007-04-19 Fridella Stephen A Intelligent network client for multi-protocol namespace redirection
US20070083646A1 (en) 2005-10-11 2007-04-12 Integrated Device Technology, Inc. Switching circuit implementing variable string matching
US20070107048A1 (en) 2005-10-11 2007-05-10 David Halls Systems and Methods for Facilitating Distributed Authentication
US20070106796A1 (en) 2005-11-09 2007-05-10 Yutaka Kudo Arbitration apparatus for allocating computer resource and arbitration method therefor
US20070124502A1 (en) 2005-11-28 2007-05-31 Huawei Technologies Co., Ltd. Script language based network device configuration management system and method
US20070124806A1 (en) 2005-11-28 2007-05-31 Imperva, Inc. Techniques for tracking actual users in web application security systems
US20070136312A1 (en) 2005-12-12 2007-06-14 Imperva, Inc System and method for correlating between http requests and sql queries
US7941517B2 (en) 2005-12-27 2011-05-10 France Telecom Server and method for managing DNSSEC requests
US20090187649A1 (en) 2005-12-27 2009-07-23 France Telecom Server and Method for Managing DNSSEC Requests
US20080301760A1 (en) 2005-12-29 2008-12-04 Blue Jungle Enforcing Universal Access Control in an Information Management System
US20070162891A1 (en) 2006-01-12 2007-07-12 International Business Machines Corporation Graphical aid for generating object setup scripts
US20080270578A1 (en) 2006-01-13 2008-10-30 Huawei Technologies Co., Ltd. Method, Device And Data Download System For Controlling Effectiveness Of A Download Transaction
US7577141B2 (en) 2006-01-20 2009-08-18 Hitachi Communication Technologies, Ltd. Communication system
US7734603B1 (en) 2006-01-26 2010-06-08 Netapp, Inc. Content addressable storage array element
US20070208748A1 (en) 2006-02-22 2007-09-06 Microsoft Corporation Reliable, efficient peer-to-peer storage
US20070209075A1 (en) 2006-03-04 2007-09-06 Coffman Thayne R Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data
US20070220598A1 (en) 2006-03-06 2007-09-20 Cisco Systems, Inc. Proactive credential distribution
US20070214503A1 (en) 2006-03-08 2007-09-13 Imperva, Inc. Correlation engine for detecting network attacks and detection method
US7725093B2 (en) 2006-03-29 2010-05-25 Intel Corporation Method and apparatus for a power-efficient framework to maintain data synchronization of a mobile personal computer to simulate a connected scenario
US20140095661A1 (en) 2006-03-31 2014-04-03 Research In Motion Limited System and method for provisioning a remote resource for an electronic device
US7945908B1 (en) 2006-03-31 2011-05-17 Vmware, Inc. Method and system for improving the accuracy of timing and process accounting within virtual machines
US8464265B2 (en) 2006-04-03 2013-06-11 Secure64 Software Method and system for reallocating computational resources using resource reallocation enabling information
US20100023582A1 (en) 2006-04-12 2010-01-28 Pedersen Brad J Systems and Methods for Accelerating Delivery of a Computing Environment to a Remote User
US7639883B2 (en) 2006-04-18 2009-12-29 Nokia Corporation Method, device, mobile terminal and computer program product for providing variable compression of data files
US20080208933A1 (en) 2006-04-20 2008-08-28 Microsoft Corporation Multi-client cluster-based backup and restore
US7925908B2 (en) 2006-06-16 2011-04-12 Samsung Electronics Co., Ltd Apparatus and method for controlling slotted mode of several systems using one sleep controller in a hybrid terminal of a mobile communication system
US20070297410A1 (en) 2006-06-23 2007-12-27 Seung Yong Yoon Real-time stateful packet inspection method and apparatus
US20070297551A1 (en) 2006-06-27 2007-12-27 Samsung Electronics Co., Ltd. Deskewing method and apparatus, and data reception apparatus using the deskewing method and apparatus
US20080004022A1 (en) 2006-06-28 2008-01-03 Telefonaktiebolaget L M Ericsson (Publ) Transmission Parameter Negotiation after Packet-Switched Handover
US20080022059A1 (en) 2006-07-21 2008-01-24 Zimmerer Peter K Sequencing transactions and operations
US20090287935A1 (en) 2006-07-25 2009-11-19 Aull Kenneth W Common access card heterogeneous (cachet) system and method
US20080025297A1 (en) 2006-07-28 2008-01-31 International Business Machines Corporation Facilitating use of generic addresses by network applications of virtual servers
US7522581B2 (en) 2006-08-01 2009-04-21 International Business Machines Corporation Overload protection for SIP servers
US20080046432A1 (en) 2006-08-18 2008-02-21 Anderson Robert J Systems and methods for a snapshot of data
US20080072303A1 (en) 2006-09-14 2008-03-20 Schlumberger Technology Corporation Method and system for one time password based authentication and integrated remote access
US20080070575A1 (en) 2006-09-15 2008-03-20 Holger Claussen Method of administering call handover between cells in a communications system
US7441429B1 (en) 2006-09-28 2008-10-28 Narus, Inc. SIP-based VoIP traffic behavior profiling
US20080104443A1 (en) 2006-10-30 2008-05-01 Hiroaki Akutsu Information system, data transfer method and data protection method
US20080148340A1 (en) 2006-10-31 2008-06-19 Mci, Llc. Method and system for providing network enforced access control
US20090228956A1 (en) 2006-11-20 2009-09-10 Huawei Technologies Co., Ltd. System and charging control method of network convergence policy and charging control architecture
US20080120370A1 (en) 2006-11-22 2008-05-22 Brian Chan Virtual Meeting Server Discovery
US20080134311A1 (en) 2006-12-01 2008-06-05 Microsoft Corporation Authentication delegation based on re-verification of cryptographic evidence
US20080137659A1 (en) 2006-12-11 2008-06-12 Eric Michel Levy-Abegnoli Secured IPv6 traffic preemption
US8281383B2 (en) 2006-12-11 2012-10-02 Cisco Technology, Inc. Secured IPv6 traffic preemption
US20080159145A1 (en) 2006-12-29 2008-07-03 Raman Muthukrishnan Weighted bandwidth switching device
US20080178278A1 (en) 2007-01-22 2008-07-24 Doron Grinstein Providing A Generic Gateway For Accessing Protected Resources
US20080256224A1 (en) 2007-02-22 2008-10-16 Tadashi Kaji Data communication system and session management server
US20080205613A1 (en) 2007-02-26 2008-08-28 Service Bureau Intetel S.A. Updating routing patterns in an enterprise network
US20080205415A1 (en) 2007-02-28 2008-08-28 Morales Henry N Jerez Access, Connectivity and Interoperability for Devices and Services
US8477804B2 (en) 2007-03-02 2013-07-02 Hitachi, Ltd. ICMP translator
US20080222646A1 (en) 2007-03-06 2008-09-11 Lev Sigal Preemptive neural network database load balancer
US7908245B2 (en) 2007-03-09 2011-03-15 Fujitsu Limited Database management method and database management apparatus
US20080225710A1 (en) 2007-03-12 2008-09-18 Murali Raja Systems and Methods for Load Balancing Based on User Selected Metrics
US20100017846A1 (en) 2007-03-23 2010-01-21 Huawei Technologies Co., Ltd. Service processing method and system, and policy control and charging rules function
GB2448071A (en) 2007-03-30 2008-10-01 Symantec Corp Associating a query with an application user
US20080243769A1 (en) 2007-03-30 2008-10-02 Symantec Corporation System and method for exporting data directly from deduplication storage to non-deduplication storage
JP2008257738A (en) 2007-03-30 2008-10-23 Symantec Corp Method of identifying application user as source of database activity
US20080275843A1 (en) 2007-03-30 2008-11-06 Symantec Corporation Identifying an application user as a source of database activity
WO2008130983A1 (en) 2007-04-16 2008-10-30 Attune Systems, Inc. File aggregation in a switched file system
US20090077097A1 (en) 2007-04-16 2009-03-19 Attune Systems, Inc. File Aggregation in a Switched File System
US8239954B2 (en) 2007-05-07 2012-08-07 Microsoft Corporation Access control based on program properties
US20080282047A1 (en) 2007-05-08 2008-11-13 Hitachi, Ltd. Methods and apparatus to backup and restore data for virtualized storage area
US8205246B2 (en) 2007-05-10 2012-06-19 Cisco Technology, Inc. User sensitive filtering of network application layer resources
US20090296624A1 (en) 2007-05-14 2009-12-03 Samsung Electronics Co., Ltd. Method and apparatus for transmitting broadcast, method and apparatus for receiving broadcast
US20080288661A1 (en) 2007-05-16 2008-11-20 Michael Galles Method and system to map virtual i/o devices and resources to a standard i/o bus
US20090094252A1 (en) 2007-05-25 2009-04-09 Attune Systems, Inc. Remote File Virtualization in a Switched File System
WO2008147973A2 (en) 2007-05-25 2008-12-04 Attune Systems, Inc. Remote file virtualization in a switched file system
US8266427B2 (en) 2007-06-08 2012-09-11 Cisco Technology, Inc. Secure mobile IPv6 registration
US20080304457A1 (en) 2007-06-08 2008-12-11 Pascal Thubert Secure mobile IPv6 registration
US8321908B2 (en) 2007-06-15 2012-11-27 Cisco Technology, Inc. Apparatus and method for applying network policy at a network device
US8107471B2 (en) 2007-06-15 2012-01-31 Hitachi, Ltd. Communication system, server, control apparatus and communication apparatus
US20080320093A1 (en) 2007-06-20 2008-12-25 Goolara, Llc Controlling the sending of electronic mail
US7933946B2 (en) 2007-06-22 2011-04-26 Microsoft Corporation Detecting data propagation in a distributed system
US20090007162A1 (en) 2007-06-29 2009-01-01 Microsoft Corporation Flexible namespace prioritization
US7984141B2 (en) 2007-07-16 2011-07-19 Cisco Technology, Inc. Independent load balancing for servers
US20090028337A1 (en) 2007-07-23 2009-01-29 Savi Technology, Inc. Method and Apparatus for Providing Security in a Radio Frequency Identification System
US20090037975A1 (en) 2007-07-30 2009-02-05 Ishikawa Mark M System and Method for Authenticating Content
US20090041230A1 (en) 2007-08-08 2009-02-12 Palm, Inc. Mobile Client Device Driven Data Backup
US20090049230A1 (en) 2007-08-17 2009-02-19 Pandya Ashish A FSA Context Switch Architecture for Programmable Intelligent Search Memory
US20090055607A1 (en) 2007-08-21 2009-02-26 Schack Darren P Systems and methods for adaptive copy on write
US20090070617A1 (en) 2007-09-11 2009-03-12 Arimilli Lakshminarayana B Method for Providing a Cluster-Wide System Clock in a Multi-Tiered Full-Graph Interconnect Architecture
US20090077619A1 (en) 2007-09-19 2009-03-19 Boyce Kevin Gerard Method and system for dynamic protocol decoding and analysis
US20090100518A1 (en) 2007-09-21 2009-04-16 Kevin Overcash System and method for detecting security defects in applications
US7822939B1 (en) 2007-09-25 2010-10-26 Emc Corporation Data de-duplication using thin provisioning
US7870154B2 (en) 2007-09-28 2011-01-11 Hitachi, Ltd. Method and apparatus for NAS/CAS unified storage system
US8199757B2 (en) 2007-09-28 2012-06-12 Interdigital Patent Holdings, Inc. Method and apparatus for layer 2 processing and creation of protocol data units for wireless communications
US20090089344A1 (en) 2007-09-28 2009-04-02 Emc Corporation Network accessed storage files system query/set proxy service for a storage virtualization system
US20090132616A1 (en) 2007-10-02 2009-05-21 Richard Winter Archival backup integration
US20090094610A1 (en) 2007-10-05 2009-04-09 Cisco Technology, Inc. Scalable Resources In A Virtualized Load Balancer
US20100064001A1 (en) 2007-10-10 2010-03-11 Power Takeoff, L.P. Distributed Processing
US20090103524A1 (en) 2007-10-18 2009-04-23 Srinivas Mantripragada System and method to precisely learn and abstract the positive flow behavior of a unified communication (uc) application and endpoints
US20090106263A1 (en) 2007-10-20 2009-04-23 Khalid Atm Shafiqul Systems and methods for folder redirection
WO2009052668A1 (en) 2007-10-22 2009-04-30 Zte Corporation A nat-pt device and a load-sharing method for nat-pt device
JP2009124113A (en) 2007-10-23 2009-06-04 Semiconductor Energy Lab Co Ltd Microcrystalline semiconductor film, thin-film transistor, and display device having thin-film transistor
US20090125955A1 (en) 2007-11-08 2009-05-14 At&T Bls Intellectual Property, Inc Methods, computer program products, and virtual servers for a virtual collaborative environment
US20090204649A1 (en) 2007-11-12 2009-08-13 Attune Systems, Inc. File Deduplication Using Storage Tiers
US20090210431A1 (en) 2007-11-12 2009-08-20 Attune Systems, Inc. Load Sharing Cluster File Systems
US20090204705A1 (en) 2007-11-12 2009-08-13 Attune Systems, Inc. On Demand File Virtualization for Server Configuration Management with Limited Interruption
US20090254592A1 (en) 2007-11-12 2009-10-08 Attune Systems, Inc. Non-Disruptive File Migration
US20090125496A1 (en) 2007-11-13 2009-05-14 B-Hive Networks, Inc Network device and method for monitoring of backend transactions in data centers
US20090125532A1 (en) 2007-11-13 2009-05-14 B-Hive Networks, Inc Method and system for correlating front-end and back-end transactions in a data center
US20090204650A1 (en) 2007-11-15 2009-08-13 Attune Systems, Inc. File Deduplication using Copy-on-Write Storage Tiers
US8468267B2 (en) 2007-12-01 2013-06-18 Alcatel Lucent IMS diameter router with load balancing
US8615022B2 (en) 2007-12-20 2013-12-24 British Telecommunications Public Limited Company Client/server adaptation scheme for communications traffic
US8646067B2 (en) 2008-01-26 2014-02-04 Citrix Systems, Inc. Policy driven fine grain URL encoding mechanism for SSL VPN clientless access
NZ566291A (en) 2008-02-27 2008-12-24 Actionthis Ltd Methods and devices for post processing rendered web pages and handling requests of post processed web pages
US20090271865A1 (en) 2008-04-23 2009-10-29 Huawei Technologies Co., Ltd. Method and device for detecting flood attacks
US8488465B2 (en) 2008-05-08 2013-07-16 Verizon Patent And Licensing Inc. Intercept flow distribution and intercept load balancer
US20130336122A1 (en) 2008-05-08 2013-12-19 Telefonaktiebolaget L M Ericsson (Publ) Load balancing pseudowire encapsulated iptv channels over aggregated links
US20090300407A1 (en) 2008-05-29 2009-12-03 Sandeep Kamath Systems and methods for load balancing via a plurality of virtual servers upon failover using metrics from a backup virtual server
EP2244418A1 (en) 2008-07-28 2010-10-27 Chengdu Huawei Symantec Technologies Co., Ltd. Database security monitoring method, device and system
US20100034381A1 (en) * 2008-08-08 2010-02-11 Microsoft Corporation Secure resource name resolution using a cache
US20100036959A1 (en) 2008-08-08 2010-02-11 Microsoft Corporation Secure resource name resolution
US20100061380A1 (en) 2008-09-05 2010-03-11 Cisco Technology, Inc., A Corporation Of California Load Balancing across Multiple Network Address Translation (NAT) Instances and/or Processors
US20100071048A1 (en) 2008-09-12 2010-03-18 Microsoft Corporation Service binding
US20100077462A1 (en) 2008-09-24 2010-03-25 Neustar, Inc. Secure domain name system
US20110047620A1 (en) 2008-10-21 2011-02-24 Lookout, Inc., A California Corporation System and method for server-coupled malware prevention
US20100115236A1 (en) 2008-10-31 2010-05-06 Cray Inc. Hierarchical shared semaphore registers
US20100122091A1 (en) 2008-11-07 2010-05-13 Yi-Hsiung Huang Access Control System And Method Based On Hierarchical Key, And Authentication Key Exchange Method Thereof
US8875274B2 (en) 2008-11-10 2014-10-28 Blackberry Limited Methods and apparatus for providing indirect alternative paths to obtain session policy
US20100142382A1 (en) 2008-12-05 2010-06-10 Jungck Peder J Identification of patterns in stateful transactions
US20100150154A1 (en) 2008-12-12 2010-06-17 Canon Kabushiki Kaisha Method for transmitting a multi-channel data stream on a multi-transport tunnel, corresponding computer-readable storage means and tunnel end-points
US20100165877A1 (en) 2008-12-30 2010-07-01 Amit Shukla Methods and apparatus for distributed dynamic network provisioning
US20100179984A1 (en) 2009-01-13 2010-07-15 Viasat, Inc. Return-link optimization for file-sharing traffic
US8274895B2 (en) 2009-01-26 2012-09-25 Telefonaktiebolaget L M Ericsson (Publ) Dynamic management of network flows
US20120101952A1 (en) 2009-01-28 2012-04-26 Raleigh Gregory G System and Method for Providing User Notifications
US8189567B2 (en) 2009-01-29 2012-05-29 Telefonaktiebolaget L M Ericsson (Publ) Method and nodes for registering a terminal
US20100211547A1 (en) 2009-02-18 2010-08-19 Hitachi, Ltd. File sharing system, file server, and method for managing files
US20100217890A1 (en) 2009-02-20 2010-08-26 Microsoft Corporation Using server type to obtain network address
US20120016994A1 (en) 2009-03-03 2012-01-19 Hitachi, Ltd. Distributed system
US20110321122A1 (en) 2009-03-04 2011-12-29 Koninklijke Philips Electronics N.V. Specifying an access control policy
US20100228813A1 (en) 2009-03-05 2010-09-09 Oki Networks Co., Ltd. Information conversion apparatus, information conversion method, information conversion program and relay device
US20100251330A1 (en) 2009-03-12 2010-09-30 Kroeselberg Dirk Optimized relaying of secure network entry of small base stations and access points
US20100242092A1 (en) 2009-03-20 2010-09-23 James Harris Systems and methods for selecting an authentication virtual server from a plurality of virtual servers
US20100274885A1 (en) 2009-04-22 2010-10-28 Microsoft Corporation Proactive load balancing
US20100325264A1 (en) 2009-04-24 2010-12-23 William Crowder Media resource storage and management
US8103781B1 (en) 2009-05-01 2012-01-24 Google Inc. Mechanism for handling persistent requests from stateless clients
US20120110210A1 (en) 2009-06-03 2012-05-03 China Mobile Communications Corporation Method and device for communication for host device with ipv4 application
US20130110939A1 (en) 2009-06-04 2013-05-02 Zte Corporation Multi-Network Multi-Plane Structure Short Message Centre System and Implementation Method Thereof
US20120054497A1 (en) 2009-06-15 2012-03-01 Nokia Siemens Networks Oy Gateway certificate creation and validation
US8379640B2 (en) 2009-06-17 2013-02-19 Alaxala Networks Corporation Internetwork device
US20100325277A1 (en) 2009-06-22 2010-12-23 Manikam Muthiah Systems and methods for handling limit parameters for a multi-core system
US20100322250A1 (en) 2009-06-22 2010-12-23 Anil Shetty Systems and methods for distributed hash table in a multi-core system
US20110040889A1 (en) 2009-08-11 2011-02-17 Owen John Garrett Managing client requests for data
US20110283018A1 (en) 2009-08-14 2011-11-17 Akamai Technologies, Inc. Method and apparatus for correlating nameserver IPv6 and IPv4 addresses
US20110038377A1 (en) 2009-08-14 2011-02-17 Telefonaktiebolaget L M Ericsson Method and apparatus for providing host node awareness for multiple NAT64 environments
US20110055921A1 (en) 2009-09-03 2011-03-03 Juniper Networks, Inc. Protecting against distributed network flood attacks
US20110066736A1 (en) 2009-09-16 2011-03-17 International Business Machines Corporation Method and system for establishing connections between nodes in a communication network
US8539224B2 (en) 2009-11-05 2013-09-17 International Business Machines Corporation Obscuring form data through obfuscation
US20110154443A1 (en) 2009-12-23 2011-06-23 Ravindranath Thakur Systems and methods for aaa-traffic management information sharing across cores in a multi-core system
US20110153822A1 (en) 2009-12-23 2011-06-23 Roy Rajan Systems and methods for managing preferred client connectivity to servers via multi-core system
US20110154132A1 (en) 2009-12-23 2011-06-23 Gunes Aybay Methods and apparatus for tracking data flow based on flow state values
US20110184733A1 (en) 2010-01-22 2011-07-28 Research In Motion Limited System and method for encoding and decoding pulse indices
US8447970B2 (en) 2010-02-09 2013-05-21 Microsoft Corporation Securing out-of-band messages
US8578050B2 (en) 2010-02-12 2013-11-05 Tekelec, Inc. Methods, systems, and computer readable media for providing peer routing at a diameter node
US20110208714A1 (en) 2010-02-19 2011-08-25 c/o Microsoft Corporation Large scale search bot detection
US20110211553A1 (en) 2010-02-26 2011-09-01 Telefonaktiebolaget Lm Ericsson Enabling IPV6 Mobility with NAT64
JP2011188071A (en) 2010-03-05 2011-09-22 Nec Corp Intrusion detection/prevention system, client computer, intrusion detection/prevention apparatus and method, and program
US20110246800A1 (en) 2010-03-31 2011-10-06 International Business Machines Corporation Optimizing power management in multicore virtual machine platforms by dynamically variable delay before switching processor cores into a low power state
US20110282997A1 (en) 2010-04-01 2011-11-17 Matthew Browning Prince Custom responses for resource unavailable errors
US20130201999A1 (en) 2010-04-26 2013-08-08 Nokia Corporation Method and Apparatus for Synthesized Address Detection
US20110292857A1 (en) 2010-05-27 2011-12-01 Futurewei Technologies, Inc. Network Address Translator 64 for Dual Stack Mobile Internet Protocol Version Six
US20110295924A1 (en) 2010-05-27 2011-12-01 Robert Paul Morris Methods, systems, and computer program products for preventing processing of an http response
US20110307629A1 (en) 2010-06-14 2011-12-15 Telefonaktiebolaget Lm Ericsson Enhancing DS-Lite with Private IPV4 Reachability
US8566474B2 (en) 2010-06-15 2013-10-22 Tekelec, Inc. Methods, systems, and computer readable media for providing dynamic origination-based routing key registration in a diameter network
US20120005372A1 (en) 2010-07-02 2012-01-05 Futurewei Technologies, Inc. Network Address Translation Six to Four for Proxy Mobile Internet Protocol Version Six
US8908545B1 (en) 2010-07-08 2014-12-09 F5 Networks, Inc. System and method for handling TCP performance in network access with driver initiated application tunnel
US20130205035A1 (en) 2010-07-28 2013-08-08 China Mobile Communications Corporation Method and device for network communications
US9083760B1 (en) 2010-08-09 2015-07-14 F5 Networks, Inc. Dynamic cloning and reservation of detached idle connections
US20120041965A1 (en) 2010-08-10 2012-02-16 Verizon Patent And Licensing Inc. Load balancing based on deep packet inspection
US8606921B2 (en) 2010-08-10 2013-12-10 Verizon Patent And Licensing Inc. Load balancing based on deep packet inspection
US20120047571A1 (en) 2010-08-17 2012-02-23 Richard Jeremy Duncan Systems and methods for detecting preselected query type within a dns query
US20120059934A1 (en) 2010-09-08 2012-03-08 Pierre Rafiq Systems and methods for self-loading balancing access gateways
US20120063314A1 (en) 2010-09-14 2012-03-15 Pignataro Carlos M Universal load-balancing tunnel encapsulation
US8886981B1 (en) 2010-09-15 2014-11-11 F5 Networks, Inc. Systems and methods for idle driven scheduling
US8417817B1 (en) 2010-09-15 2013-04-09 Google Inc. Preventing server overload
US8804504B1 (en) 2010-09-16 2014-08-12 F5 Networks, Inc. System and method for reducing CPU load in processing PPP packets on a SSL-VPN tunneling device
US20130166715A1 (en) 2010-09-16 2013-06-27 Zte Corporation Method for obtaining dns and tunnel gateway device
US20120071131A1 (en) 2010-09-21 2012-03-22 Radware, Ltd. Method and system for profiling data communication activity of users of mobile devices
US8289968B1 (en) 2010-10-27 2012-10-16 Juniper Networks, Inc. Distributed network address translation in computer networks
US9106699B2 (en) 2010-11-04 2015-08-11 F5 Networks, Inc. Methods for handling requests between different resource record types and systems thereof
US20120117379A1 (en) 2010-11-04 2012-05-10 F5 Networks, Inc. Methods for handling requests between different resource record types and systems thereof
US8726336B2 (en) 2010-12-29 2014-05-13 Sap Ag Authorizations for analytical reports
US20120174217A1 (en) 2010-12-30 2012-07-05 Verizon Patent And Licensing Inc. Network security management
US20120191847A1 (en) 2011-01-21 2012-07-26 Petrus Wilhelmus Adrianus Jacobus Maria Nas Methods, systems, and computer readable media for screening diameter messages within a diameter signaling router (dsr) having a distributed message processor architecture
US8737304B2 (en) 2011-03-01 2014-05-27 Tekelec, Inc. Methods, systems, and computer readable media for hybrid session based diameter routing
US20120259998A1 (en) 2011-04-11 2012-10-11 Matthew Kaufman System and method for translating network addresses
US8819768B1 (en) 2011-05-03 2014-08-26 Robert Koeten Split password vault
US20120284296A1 (en) 2011-05-06 2012-11-08 Verizon Patent And Licensing Inc. Database load balancing through dynamic database routing
US20120311153A1 (en) 2011-05-31 2012-12-06 Morgan Christopher Edwin Systems and methods for detecting resource consumption events over sliding intervals in cloud-based network
US20120317266A1 (en) 2011-06-07 2012-12-13 Research In Motion Limited Application Ratings Based On Performance Metrics
JP2011238263A (en) 2011-06-27 2011-11-24 Canon It Solutions Inc Information processing apparatus, information processing method, and computer program
US20130007870A1 (en) 2011-06-28 2013-01-03 The Go Daddy Group, Inc. Systems for bi-directional network traffic malware detection and removal
US8830874B2 (en) 2011-07-25 2014-09-09 Samsung Electronics Co., Ltd. Method and apparatus for load balancing in cellular communication system
US20130029726A1 (en) 2011-07-27 2013-01-31 Qualcomm Incorporated System and method for prioritizing requests to a sim
US20130103805A1 (en) 2011-07-29 2013-04-25 3Crowd Technologies, Inc. Facilitating content accessibility via different communication formats
US20130091002A1 (en) 2011-10-05 2013-04-11 News America Marketing Properties, LLC. System and method for coupon validation
US20130100815A1 (en) 2011-10-19 2013-04-25 Verizon Patent And Licensing Inc. Optimized network node selection
US8701179B1 (en) 2011-11-04 2014-04-15 Juniper Networks, Inc. Secure network address translation
US20130120168A1 (en) 2011-11-15 2013-05-16 Abhishek Kumar Systems and methods for load balancing and virtual private networking for sms center
US20130151725A1 (en) 2011-12-13 2013-06-13 B Method and System for Handling a Domain Name Service Request
US20130198322A1 (en) 2012-02-01 2013-08-01 Cisco Technology, Inc. System and method to reduce stream start-up delay for adaptive streaming
US8726338B2 (en) 2012-02-02 2014-05-13 Juniper Networks, Inc. Dynamic threat protection in mobile networks
US20130205040A1 (en) 2012-02-08 2013-08-08 Microsoft Corporation Ensuring symmetric routing to private network
US20140025823A1 (en) 2012-02-20 2014-01-23 F5 Networks, Inc. Methods for managing contended resource utilization in a multiprocessor architecture and devices thereof
US20130340079A1 (en) 2012-06-14 2013-12-19 Kddi Corporation System and method for real-time reporting of anomalous internet protocol attacks
US20130335010A1 (en) 2012-06-19 2013-12-19 Nuvoton Technology Corporation Connector and control chip
US8873753B2 (en) 2012-08-27 2014-10-28 Verizon Patent And Licensing Inc. Analysis of network operation
US9037166B2 (en) 2012-12-11 2015-05-19 Telefonaktiebolaget L M Ericsson (Publ) Apparatus and method for scheduling paging messages in a communications network
US8954080B2 (en) 2012-12-14 2015-02-10 Tektronix, Inc. Monitoring traffic across diameter core agents
US20140269484A1 (en) 2013-03-14 2014-09-18 Viasat, Inc. Delaycast queue prioritization

Non-Patent Citations (219)

* Cited by examiner, † Cited by third party
Title
"A Process for Selective Routing of Servlet Content to Transcoding Modules," Research Disclosure 422124, Jun. 1999, pp. 889-890, IBM Corporation.
"A Storage Architecture Guide," Second Edition, 2001, Auspex Systems, Inc., www.auspex.com, last accessed on Dec. 30, 2002.
"BIG-IP® Global Traffic Manager," <http://www.f5.com/products/big-ip/product-modules/global-traffic-manager.html>, last accessed Jul. 6, 2010, 2 pages.
"BIG-IP® Global Traffic Manager," <http://www.f5.com/products/bigip/product-modules/global-traffic-manager.html>, last accessed Jul. 6, 2010, 2 pages.
"BIG-IP® Global Traffic Manager™ and BIG-IP Link Controller™: Implementations," Manual 0304-00, Dec. 3, 2009, pp. 1-161, version 10.1, F5 Networks, Inc.
"BIG-IP® Global Traffic Manager™ and BIG-IP Link Controller™: Implementations,".
"BIG-IP® Systems: Getting Started Guide," Manual 0300-00, Feb. 4, 2010, pp. 1-102, version 10.1, F5 Networks, Inc.
"CSA Persistent File System Technology," A White Paper, Jan. 1, 1999, p. 1-3, http://www.cosoa.com/white_papers/pfs.php, Colorado Software Architecture, Inc.
"Detail Requirement Report: RQ-GTM-0000024," <http://fpweb/fptopic.asp?REQ:RQ-GTM-0000024>, F5 Networks, Inc., 1999, printed Mar. 31, 2010, 2 pages.
"Detail Requirement Report: RQ-GTM-0000024," <http://fpweb/fptopic.asp?REQ=RQ-GTM-0000024>, F5 Networks, Inc., 1999, printed Mar. 31, 2010, 2 pages.
"Detail Requirement Report: RQ-GTM-0000028," <http://fpweb/fptopic.asp?REQ=RQ-GTM-0000028>, F5 Networks, Inc., 1999, printed Mar. 31, 2010, 2 pages.
"Diameter MBLB Support Phase 2: Generic Message Based Load Balancing (GMBLB)", last accessed Mar. 29, 2010, pp. 1-10, (http://peterpan.f5net.com/twiki/bin/view/TMOS/TMOSDiameterMBLB).
"Distributed File System: A Logical View of Physical Storage: White Paper," 1999, Microsoft Corp., www.microsoft.com, <http://www.eu.microsoft.com/TechNet/prodtechnol/windows2000serv/maintain/DFSnt95>, pp. 1-26, last accessed on Dec. 20, 2002.
"DNS DDOS Protection Functional Spec," BigipDNSDDOSProtectionFS<TMO<TWiki, last accessed Mar. 31, 2010, 2 pages.
"DNS Security (DNSSEC) Solutions," <http://www.f5.com/solutions/security/dnssec>, F5 Networks, Inc., printed Aug. 23, 2010, pp. 1-4.
"DNSSEC Functional Spec," TMOSDnsSECFS<TMOS<TWiki, last accessed on Mar. 31, 2010, p. 1-10.
"DNSSEC Functional Spec," TMOSDnsSECFS<Tmos<TWiki, last accessed on Mar. 31, 2010, pp. 1-10.
"DNSX; DNSX Secure Signer; DNSSEC Management Solution," <http://www.xelerance.com/dnssec>. pp. 1-9.
"DNSX; DNSX Secure Signer; DNSSEC Management Solution," <http://www.xelerance.com/dnssec>.pp. 1-9, Aug. 2009.
"F5 and Infoblox Provide Customers with Complete DNS Security Solution," <http://www.f5.com/news-press-events/press/2010/20100301.html>, Mar. 1, 2010, 2 pages, F5 Networks, Inc. Seattle and Santa Clara, California.
"F5 and Infoblox Provide Customers with Complete DNS Security Solution," <http://www.f5.com/news-press-events/press/2010/20100301.html>, Mar. 1, 2010, 2 pages, F5 Networks, Inc., Seattle and Santa Clara, California.
"F5 Solutions Enable Government Organizations to Meet 2009 DNSSEC Compliance," .<http://www.f5.com/news-press-events/press/2009/20091207.html>, Dec. 7, 2009, 2 pages, F5 Networks, Inc., Seattle, California.
"F5 Solutions Enable Government Organizations to Meet 2009 DNSSEC Compliance,"<http://www.f5.com/news-press-events/press/2009/20091207.html>, Dec. 7, 2009, 2 pages, F5 Networks, Inc., Seattle, California.
"Market Research & Releases, CMPP PoC documentation", last accessed Mar. 29, 2010, (http://mainstreet/sites/PD/Teams/ProdMgmt/MarketResearch/Universal).
"Market Research & Releases, Solstice Diameter Requirements", last accessed Mar. 29, 2010, (http://mainstreet/sites/PD/Teams/Prod/Mgmt/MarketResearch/Unisversal).
"NERSC Tutorials: I/O on the Cray T3E, ‘Chapter 8, Disk Striping’," National Energy Research Scientific Computing Center (NERSC), http://hpcfnersc.gov, last accessed on Dec. 27, 2002.
"PDR/CDR for RQ-GTM-0000028," BigipDNSDDOSProtectionPDR<TMOS<TWiki, last accessed on Mar. 31, 2010, pp. 1-14.
"Respond to Server Depending on TCP::Client_Port", DevCentral Forums iRules, pp. 1-6, last accessed Mar. 26, 2010, (http://devcentral.f5.com/Default/aspx?tabid=53&forumid=5&tpage=1&v).
"Scaling Next Generation Web Infrastructure with Content-Intelligent Switching: White Paper," Apr. 2000, p. 1-9 Alteon Web Systems, Inc.
"Secure64 DNS Signer," <www.secure64.com>, 2 pages, Apr. 2010.
"Secure64 DNS Signer", <http://www.secure64.com>, Data sheet, Jun. 22, 2011, V.3.1., 2 pages.
"Servlet/Applet/HTML Authentication Process With Single Sign-On," Research Disclosure 429128, Jan. 2000, pp. 163-164, IBM Corporation.
"The AFS File System in Distributed Computing Environment," www.transarc.ibm.com/Library/whitepapers/AFS/afsoverview.html, last accessed on Dec. 20, 2002.
"Traffic Surges; Surge Queue; Netscaler Defense," 2005, PowerPoint Presentation, slides 1-12, Citrix Systems, Inc.
"UDDI Overview", Sep. 6, 2000, pp. 1-21, uddi.org, (http://www.uddi.org/).
"UDDI Technical White Paper," Sep. 6, 2000, pp. 1-12, uddi-org, (http://www.uddi.org/).
"UDDI Version 3.0.1", UDDI Spec Technical Committee Specification, Oct. 14, 2003, pp. 1-383, uddi.org, (http://www.uddi.org/).
"Veritas SANPoint Foundation Suite(tm) and SANPoint Foundation Suite(tm) HA: New Veritas Volume Management and File System Technology for Cluster Environments," Sep. 2001, Veritas Software Corp.
"Who is Xelerance," <http://www.xelerance.com>, slides 1-6 (2007).
"Who is Xelerance," <http://www.xelerance.com>, slides 1-6, Jul. 2007.
"Who is Xelerance," <http://www.xelerance.com>, slides 1-6.
"Windows Clustering Technologies —An Overview," Nov. 2001, Microsoft Corp., www.microsoft.com, last accessed on Dec. 30, 2002.
"Windows Server 2003 Kerberos Extensions," Microsoft TechNet, 2003 (Updated Jul. 31, 2004), http://technet.microsoft.com/en-us/library/cc738207, Microsoft Corporation.
Abad, C., et al., "An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks", IEEE, Computer Society, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07), 2007, pp. 1-8.
Aguilera, Marcos K. et al., "Improving recoverability in multi-tier storage systems," International Conference on Dependable Systems and Networks (DSN-2007), Jun. 2007, 10 pages, Edinburgh, Scotland.
Anderson et al., "Serverless Network File System," in the 15th Symposium on Operating Systems Principles, Dec. 1995, Association for Computing Machinery, Inc. (18 pages).
Anderson, Darrell C. et al., "Interposed Request Routing for Scalable Network Storage," ACM Transactions on Computer Systems 20(1): (Feb. 2002), pp. 1-24.
Anonymous, "How DFS Works: Remote File Systems," Distributed File System (DFS) Technical Reference, retrieved from the Internet on Feb. 13, 2009: URL<:http://technetmicrosoft.com/en-us/library/cc782417WS.10,printer).aspx> (Mar. 2003).
Apple, Inc., "Mac OS X Tiger Keynote Intro. Part 2," Jun. 2004, www.youtube.com <http://www.youtube.com/watch?v=zSBJwEmRJbY>, p. 1.
Apple, Inc., "Tiger Developer Overview Series: Working with Spotlight," Nov. 23, 2004, www.apple.com using www.archive.org <http://web.archive.org/web/20041123005335/developer.apple.com/macosx/tiger/spotlight.html>, pp. 1-6.
Arends et al., "DNS Security Introduction and Requirements", Network Working Group, RFC 4033, Mar. 2005, pp. 1-20.
Arends et al., "Protocol Modifications for the DNS Security Extensions," Network Working Group, RFC 4035, Mar. 1, 2005, 54 pages, The Internet Society.
Arends et al., "Resource Records for the DNS Security Extensions", Network Working Group, RFC 4034, Mar. 2005, pp. 1-28.
Arends R., et al., "DNS Security Introduction and Requirements", Network Working Group, RFC 4033, Mar. 2005, pp. 1-20.
Arends R., et al., "Protocol Modifications for the DNS Security Extensions", Network Working Group, RFC 4035, Mar. 2005, pp. 1-50.
Arends R., et al., "Resource Records for the DNS Security Extensions", Network Working Group, RFC 4034, Mar. 2005, pp. 1-28.
Aura T., "Cryptographically Generated Addresses (CGA)", Network Working Group, RFC 3972, Mar. 2005, pp. 1-21.
Baer, T., et al., "The Elements of Web Services" ADTmag.com, Dec. 1, 2002, pp. 1-6, (http://www.adtmag.com).
Bagnulo et al., "DNS 64: DNS extensions for Network Address Translation from IPv6 Clients to IPv4 Servers," Internet draft, Jul. 2010, pp. 1-31, IETF Trust.
Bagnulo, et al., "DNS extensions for Network Address translation from IPv6 Clients to IPv4 Servers", IETF Trust (Jul. 2010).
Basney et al., "Credential Wallets: A Classification of Credential Repositories Highlighting MyProxy," Sep. 19-21, 2003, pp. 1-20, 31st Research Conference on Communication, Information and Internet Policy (TPRC 2003), Arlington, Virginia.
Bau et al., "A Security Evaluation of DNSEC with NSEC3," Mar. 2, 2010; updated version corrects and supersedes a paper in the NDSS' 10 proceedings, pp. 1-18.
Bau et al., "A Security Evaluation of DNSSEC with NSEC3," Mar. 2, 2010; updated version corrects and supersedes a paper in the NDSS' 10 proceedings, pp. 1-17.
BIG-IP® Access Policy Manager®: Implementations, Version 12.0, F5 Networks, Inc., 2015, pp. 1-108.
Blue Coat, "Technology Primer: CIFS Protocol Optimization," Blue Coat Systems Inc., 2007, pp. 1-3, (http://www.bluecoat.com).
Botzum, Keys, "Single Sign On—A Contrarian View," Aug. 6, 2001, pp. 1-8, Open Group Website, http://www.opengroup.org/security/topics.htm.
Cabrera et al., "Swift: A Storage Architecture for Large Objects," In Proceedings of the-Eleventh IEEE Symposium on Mass Storage Systems, Oct. 1991, pp. 123-128.
Cabrera et al., "Swift: Using Distributed Disk Striping to Provide High I/O Data Rates," Fall 1991, pp. 405-436, vol. 4, No. 4, Computing Systems.
Cabrera et al., "Using Data Striping in a Local Area Network," 1992, technical report No. UCSC-CRL-92-09 of the Computer & Information Sciences Department of University of California at Santa Cruz.
Callaghan et al., "NFS Version 3 Protocol Specifications" (RFC 1813), Jun. 1995, The Internet Engineering Task Force (IETN), www.ietf.org, last accessed on Dec. 30, 2002.
Carns et al., "PVFS: A Parallel File System for Linux Clusters," in Proceedings of the Extreme Linux Track: 4th Annual Linux Showcase and Conference, Oct. 2000, pp. 317-327, Atlanta, Georgia, USENIX Association.
Carpenter, B., "Transmission of IPv6 over IPv4 Domains Without Explicit Tunnels", Network Working Group, RFC 2529, Mar. 1999, pp. 1-10.
Cavale, M. R., "Introducing Microsoft Cluster Service (MSCS) in the Windows Server 2003", Microsoft Corporation, Nov. 2002.
Crescendo Networks, "Application Layer Processing (ALP)," 2003-2009, pp. 168-186, Chapter 9, CN-5000E/5500E, Foxit Software Company.
Dan Kaminsky, (slideshow presentation) "Black Ops of Fundamental Defense: Introducing the Domain Key Infrastructure", retrieved from Internet URL: http://www.slideshare.net/RecursionVentures/dki-2, (Aug. 2010).
Dan Kaminsky, (slideshow presentation) "Black Ops of Fundamental Defense: Introducing the Domain Key Infrastructure", retrieved from Internet URL: http://www.slideshare.net/RecursionVentures/dki-2, (slides 1-116) (Aug. 2010).
Eastlake D., "Domain Name System Security Extensions", Network Working Group, RFC 2535, Mar. 1999, pp. 1-44.
English Translation of Notification of Reason(s) for Refusal for JP 2002-556371 (Dispatch Date: Jan. 22, 2007).
F5 Networks Inc., "3-DNS® Reference Guide, version 4.5", F5 Networks Inc., Sep. 2002, pp. 2-1-2-8, 3-1-3-12, 5-1-5-24, Seattle, Washington.
F5 Networks Inc., "Big-IP® Reference Guide, version 4.5", F5 Networks Inc., Sep. 2002, pp. 11-1-11-32, Seattle, Washington.
F5 Networks Inc., "Case Information Log for ‘Issues with BoNY upgrade to 4.3’", as early as Feb. 2008.
F5 Networks Inc., "Configuration Guide for Local Traffic Management", F5 Networks Inc., Jan. 2006, version 9.2.2, 406 pgs.
F5 Networks Inc., "Deploying the BIG-IP LTM for Diameter Traffic Management" F5® Deployment Guide, Publication date Sep. 2010, Version 1.2, pgs. 1-19.
F5 Networks Inc., "F5 Diameter RM", Powerpoint document, Jul. 16, 2009, pp. 1-7.
F5 Networks Inc., "F5 WANJet CIFS Acceleration", White Paper, F5 Networks Inc., Mar. 2006, pp. 1-5, Seattle, Washington.
F5 Networks Inc., "Routing Global Internet Users to the Appropriate Data Center and Applications Using F5's 3-DNS Controller", F5 Networks Inc., Aug. 2001, pp. 1-4, Seattle, Washington, (http://www.f5.com/f5producs/3dns/relatedMaterials/UsingF5.html).
F5 Networks Inc., "Using F5's 3-DNS Controller to Provide High Availability Between Two or More Data Centers", F5 Networks Inc., Aug. 2001, pp. 1-4, Seattle, Washington, (http://www.f5.com/f5products/3dns/relatedMaterials/3DNSRouting.html).
F5 Networks, Inc., "BIG-IP ASM 11.2.0", Release Notes, Sep. 19, 2012, Version 11.2.0, F5 Networks, Inc.
F5 Networks, Inc., "BIG-IP Controller with Exclusive OneConnect Content Switching Feature Provides a Breakthrough System for Maximizing Server and Network Performance," Press Release, May 8, 2001, 2 pages, Las Vegas, Nevada.
F5 Networks, Inc., "BIG-IP Systems: Getting Started Guide," Manual 0300-00, Feb. 4, 2010, pp. 1-102, version 10.1, F5 Networks, Inc.
F5 Networks, Inc., "BIG-IP® Access Policy Manager®: Application Access," version 12.1, published May 9, 2016 (66 pages).
F5 Networks, Inc., "BIG-IP® Access Policy Manager®: Authentication and Single Sign-On," version 12.1, published May 9, 2016 (332 pages).
F5 Networks, Inc., "BIG-IP® Access Policy Manager®: Implementations," version 12.1, published May 9, 2016 (168 pages).
F5 Networks, Inc., "BIG-IP® Access Policy Manager®: Network Access," version 12.1, published May 9, 2016 (108 pages).
F5 Networks, Inc., "BIG-IP® Access Policy Manager®: Portal Access," version 12.1, published May 9, 2016 (82 pages).
F5 Networks, Inc., "BIG-IP® Access Policy Manager®: Secure Web Gateway", version 12.1, published May 9, 2016 (180 pages).
F5 Networks, Inc., "BIG-IP® Application Security Manager™: Getting Started Guide", Version 11.2, May 7, 2012, F5 Networks, Inc.
F5 Networks, Inc., "BIG-IP® Application Security Manager™: Implementations", Version 11.2, May 7, 2012, F5 Networks, Inc.
F5 Networks, Inc., "BIG-IP® TMOS®: Implementations", Manual, May 5, 2015, Version 11.2, F5 Networks, Inc.
F5 Networks, Inc., "Configuration Guide for BIG-IP® Application Security Manager™", Manual, May 7, 2012, Version 11.2, F5 Networks, Inc.
F5 Networks, Inc., "F5 TMOS Operations Guide", Manual, Mar. 5, 2015, F5 Networks, Inc.
F5 Networks, Inc., "Release Note: BIG-IP APM 12.1.0," published Jun. 6, 2016 (13 pages).
Fajardo V., "Open Diameter Software Architecture," Jun. 25, 2004, pp. 1-6, Version 1.0.7.
Fan et al., "Summary Cache: A Scalable Wide-Area Protocol", Computer Communications Review, Association Machinery, New York, USA, Oct. 1998, vol. 28, Web Cache Sharing for Computing No. 4, pp. 254-265.
Farley, M., "Building Storage Networks," Jan. 2000, McGraw Hill, ISBN 0072120509.
Fielding et al., "Hypertext Transfer Protocol—HTTP/1.1," Network Working Group, RFC: 2068, Jan. 1997, pp. 1-162.
Fielding et al., "Hypertext Transfer Protocol—HTTP/1.1," Network Working Group, RFC: 2616, Jun. 1999, pp. 1-176, The Internet Society.
Floyd et al., "Random Early Detection Gateways for Congestion Avoidance," Aug. 1993, pp. 1-22, IEEE/ACM Transactions on Networking, California.
Forrester Research, Inc., "DNSSEC Ready for Prime Time", Forrester Research, Inc. Cambridge, MA (Jul. 2010).
Forrester Research, Inc., "DNSSEC Ready for Prime Time", Forrester Research, Inc. Cambridge, MA, 23 pages (Jul. 2010).
Gibson et al., "File Server Scaling with Network-Attached Secure Disks," in Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems (Sigmetrics '97), Association for Computing Machinery, Inc., Jun. 15-18, 1997.
Gibson et al., "NASD Scalable Storage Systems," Jun. 1999, USENIX99, Extreme Linux Workshop, Monterey, California.
Gupta et al., "Algorithms for Packet Classification", Computer Systems Laboratory, Stanford University, CA, Mar./Apr. 2001, pp. 1-29.
Hagino J., et al., "An IPv6-to-IPv4 Transport Relay Translator", Network Working Group, RFC 3142, Jun. 2001, pp. 1-11.
Harrison, C., May 19, 2008 response to Communication pursuant to Article 96(2) EPC dated Nov. 9, 2007 in corresponding European patent application No. 02718824.2.
Hartman, J., "The Zebra Striped Network File System," 1994, Ph.D. dissertation submitted in the Graduate Division of the University of California at Berkeley.
Haskin et al., "The Tiger Shark File System," 1996, in proceedings of IEEE, Spring Compcon, Santa Clara, CA, www.research.ibm.com, last accessed on Dec. 30, 2002.
Heinz G., "Priorities in Stream Transmission Control Protocol (SCTP) Multistreaming", Thesis submitted to the Faculty of the University of Delaware, Spring 2003, pp. 1-35.
Higgins, Kelly Jackson, "Internet Infrastructure Reaches Long-Awaited Security Milestone," Tech Center: Security Services, <http//www.darkreading.com/securityservices/security/management/showArticle.jhtml?article>, Jul. 28, 2010. pp. 1-4.
Higgins, Kelly Jackson, "Internet Infrastructure Reaches Long-Awaited Security Milestone," Tech Center: Security Services, <http://www.darkreading.com/securityservices/securtiy/management/showArticle.jhtml?article>, Jul. 28, 2010. pp. 1-4.
Hochmuth, Phil, "F5, CacheFlow pump up content-delivery lines," Network World Fusion, May 4, 2001, 1 page, Las Vegas, Nevada.
Howarth, Fran, "Investing in security versus facing the consequences," White Paper by Bloor Research, Sep. 2010, pp. 1-15.
Hu, J., Final Office action dated Sep. 21, 2007 for related U.S. Appl. No. 10/336,784.
Hu, J., Office action dated Feb. 6, 2007 for related U.S. Appl. No. 10/336,784.
Hwang et al., "Designing SSI Clusters with Hierarchical Checkpointing and Single 1/0 Space," IEEE Concurrency, Jan.-Mar. 1999, pp. 60-69.
Ilvesmaki M., et al., "On the Capabilities of Application Level Traffic Measurements to Differentiate and Classify Internet Traffic", Presented in SPIE's International Symposium ITcom, Aug. 19-21, 2001, pp. 1-11, Denver, Colorado.
International Search Report and Written Opinion for International Patent Application No. PCT/US2011/058469 (dated May 30, 2012).
International Search Report and Written Opinion for PCT/US2011/054331, dated Mar. 13, 2012, 13 pages.
International Search Report for International Patent Application No. PCT/US02/00720, dated Mar. 19, 2003.
International Search Report for International Patent Application No. PCT/US2008/060449 (dated Apr. 9, 2008).
International Search Report for International Patent Application No. PCT/US2008/064677 (dated Sep. 6, 2009).
International Search Report for International Patent Application No. PCT/US2008/083117 (dated Jun. 23, 2009).
International Search Report for International Patent Application No. PCT/US2012/071648 (dated May 27, 2013).
International Search Report from International Application No. PCT/US03/41202, dated Sep. 15, 2005.
Internet Protocol,"Darpa Internet Program Protocol Specification", (RFC:791), Information Sciences Institute, University of Southern California, Sep. 1981, pp. 1-49.
Karamanolis et al., "An Architecture for Scalable and Manageable File Services," HPL-2001-173, Jul. 26, 2001. p. 1-14.
Katsurashima et al., "NAS Switch: A Novel CIFS Server Virtualization, Proceedings," 20th IEEE/11th NASA Goddard Conference on Mass Storage Systems and Technologies, 2003 (MSST 2003), Apr. 2003.
Kawamoto, D., "Amazon Files for Web Services Patent", CNET News.com, Jul. 28, 2005, pp. 1-2, last accessed May 4, 2006, (http://news.com).
Kimball, C.E. et al., "Automated Client-Side Integration of Distributed Application Servers," 13Th LISA Conf., 1999, pp. 275-282 of the Proceedings.
Klayman, J., Jul. 18, 2007 e-mail to Japanese associate including instructions for response to office action dated Jan. 22, 2007 in corresponding Japanese patent application No. 2002-556371.
Klayman, J., Nov. 13, 2008 e-mail to Japanese associate including instructions for response to office action dated May 26, 2008 in corresponding Japanese patent application No. 2002-556371.
Klayman, J., response filed by Japanese associate to office action dated Jan. 22, 2007 in corresponding Japanese patent application No. 2002-556371.
Kohl et al., "The Kerberos Network Authentication Service (V5)," RFC 1510, Sep. 1993. (http://www.ietf.org/rfc/rfc1510.txt?number=1510).
Korkuzas, V., Communication pursuant to Article 96(2) EPC dated Sep. 11, 2007 in corresponding European patent application No. 02718824.2-2201.
LaMonica M., "Infravio Spiffs Up Web Services Registry Idea", CNET News.com, May 11, 2004, pp. 1-2, last accessed Sep. 20, 2004, (http://www.news.com).
Laurie et al., "DNS Security (DNSSEC) Hashed Authenticated Denial of Existence," Network Working Group, RFC 5155, Feb. 2008, pp. 1-51.
Laurie, et. al., "DNS Security (DNSSEC) Hashed Authenticated Denial of Existence", Mar. 2008, pp. 1-52, The IETF Trust.
Lelil, S., "Storage Technology News: AutoVirt adds tool to help data migration projects," Feb. 25, 2011, last accessed Mar. 17, 2011, <http://searchstorage.techtarget.com/news/article/0,289142,sid5_gci1527986,00.html >.
Long et al., "Swift/RAID: A distributed RAID System", Computing Systems, Summer 1994, vol. 7, pp. 333-359.
Mac Vittie, L., "Message-Based Load Balancing: Using F5 Solutions to Address the Challenges of Scaling Diameter, RADIUS, and Message-Oriented Protocols", F5 Technical Brief, 2005, pp. 1-9, F5 Networks Inc., Seattle, Washington.
MacVittie, Lori, "It's DNSSEC Not DNSSUX," DevCentral>Weblogs, <http://devcentral.f5.com/weblogs/macvittie/archive/2009/11/18/itrsquos-dnssec-not-dnssux.aspx>, posted on Nov. 18, 2009, accessed on Jul. 6, 2010, pp. 3-7.
Macvittie, Lori, "It's DNSSEC Not DNSSUX," DevCentral>Weblogs, <http://devcentral.f5.com/weblogs/macvittie/archive/2009/11/18/itrsquos-dnssec-notdnssux.aspx>, posted on Nov. 18, 2009, accessed on Jul. 6, 2010, pp. 3-7.
MacVittie, Lori, "Message-Based Load Balancing," Technical Brief, Jan. 2010, pp. 1-9, F5 Networks, Inc.
Meyer et al., "F5 and Infoblox DNS Integrated Architecture: Offering a Complete Scalable, Secure DNS Solution, "F5 Technical Brief, Feb. 2, 2010, 18 pages, URL: http://web.archive.prg/web/20100326145019/http://www.f5.com/pdf/white-papers/infoblox-wp.pdf.
Meyer et al., "F5 and Infoblox DNS Integrated Architecture: Offering a Complete Scalable, Secure DNS Solution," F5 Technical Brief, Feb. 2, 2010, 18 pages, URL: http://web.archive.prg/web/20100326145019/http://www.f5.com/pdf/white-papers/infoblox-wp.pdf.
Modiano E., "Scheduling Algorithms for Message Transmission Over a Satellite Broadcast System", MIT Lincoln Laboratory Advanced Network Group, Nov. 1997, pp. 1-7.
Nichols K., et al., "Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers", (RFC:2474) Network Working Group, Dec. 1998, pp. 1-19, last accessed Oct. 8, 2012, (http://www.ietf.org/rfc/rfc2474.txt).
Noghani et al., "A Novel Approach to Reduce Latency on the Internet: ‘Component-Based Download’," Proceedings of the Computing, Las Vegas, NV, Jun. 2000, pp. 1-6 on the Internet: Intl Conf. on Internet.
Norton et al., "CIFS Protocol Version CIFS-Spec 0.9," 2001, Storage Networking Industry Association (SNIA), www.snia.org, last accessed on Mar. 26, 2001.
Notice of Reasons for Rejection and Its English Translation for corresponding Japanese Patent Application No. 2014-550426 (Apr. 13, 2016) (3 pages).
Novotny et al., "An Online Credential Repository for the Grid: MyProxy," 2001, pp. 1-8.
Office Action for corresponding Chinese Application No. 201280070784.4 (dated Dec. 6, 2016) (15 pages).
Office Action for corresponding Taiwan Patent Application No. 101145417 (dated May 11, 2016) (11 pages).
Ott D., et al., "A Mechanism for TCP-Friendly Transport-level Protocol Coordination", USENIX Annual Technical Conference, 2002, University of North Carolina at Chapel Hill, pp. 1-12.
OWASP, "Testing for Cross site scripting", OWASP Testing Guide v2, Table of Contents, Feb. 24, 2011, pp. 1-5, (www.owasp.org/index.php/Testing_for_Cross_site_scripting).
Padmanabhan V., et al., "Using Predictive Prefetching to Improve World Wide Web Latency", SIGCOM, 1996, pp. 1-15.
Pashalidis et al., "A Taxonomy of Single Sign-On Systems," 2003, pp. 1-16, Royal Holloway, University of London, Egham Sunray, TW20, 0EX, United Kingdom.
Pashalidis et al., "Impostor: A Single Sign-On System for Use from Untrusted Devices," Global Telecommunications Conference, 2004, GLOBECOM '04, IEEE, Issue Date: Nov. 29-Dec. 3, 2004.Royal Holloway, University of London.
Patterson et al., "A case for redundant arrays of inexpensive disks (RAIFD)", Chicago, Illinois, Jun. 1-3, 1998, in Proceedings of ACM Sigmod conference on the Management of Data, pp. 109-116, Association for Computing Machinery, Inc., www.acm.org, last accessed on Dec. 20, 2002.
Pearson, P.K., "Fast Hashing of Variable-Length Text Strings," Comm. of the ACM, Jun. 1990, pp. 1-4, vol. 33, No. 6.
Peter Silva, Securing Web Presence with DNSSEC, ISSA Preeminent Trusted Global Information Security Community, ISSA Journal, Mar. 2010), pp. 32-36. *
Peterson, M., "Introducing Storage Area Networks," Feb 1998, InfoStor, www.infostor.com, last accessed on Dec. 20, 2002.
Preslan et al., "Scalability and Failure Recovery in a Linux Cluster File System," in Proceedings of the 4th Annual Linux Showcase & Conference, Atlanta, Georgia, Oct. 10-14, 2000, pp. 169-180 of the Proceedings, www.usenix.org, last accessed on Dec. 20, 2002.
Response filed Jul. 6, 2007 to Office action dated Feb. 6, 2007 for related U.S. Appl. No. 10/336,784.
Response filed Mar. 20, 2008 to Final Office action dated Sep. 21, 2007 for U.S. Appl. No. 10/336,784.
Rodriguez et al., "Parallel-access for mirror sites in the Internet," InfoCom 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE Tel Aviv, Israel Mar. 26-30, 2000, Piscataway, NJ, USA, IEEE, US, Mar. 26, 2000 (Mar. 26, 2000), pp. 864-873, XP010376176 ISBN: 0-7803-5880-5 p. 867, col. 2, last paragraph—p. 868, col. 1, paragraph 1.
RODRIGUEZ P., KIRPAL A., BIERSACK E.W.: "Parallel-access for mirror sites in the Internet", INFOCOM 2000. NINETEENTH ANNUAL JOINT CONFERENCE OF THE IEEE COMPUTER AND COMMUNICATIONS SOCIETIES. PROCEEDINGS. IEEE TEL AVIV, ISRAEL 26-30 MARCH 2000, PISCATAWAY, NJ, USA,IEEE, US, vol. 2, 26 March 2000 (2000-03-26) - 30 March 2000 (2000-03-30), US, pages 864 - 873, XP010376176, ISBN: 978-0-7803-5880-5, DOI: 10.1109/INFCOM.2000.832261
Rosen E., et al., "MPLS Label Stack Encoding", (RFC:3032) Network Working Group, Jan. 2001, pp. 1-22, last accessed Oct. 8, 2012, (http://www.ietf.org/rfc/rfc3032.txt).
RSYNC, "Welcome to the RSYNC Web Pages," Retrieved from the Internet URL: http://samba.anu.edu.ut.rsync/. (Retrieved on Dec. 18, 2009).
Savage, et al., "AFRAID—A Frequently Redundant Array of Independent Disks," Jan. 22-26, 1996, pp. 1-13, USENIX Technical Conference, San Diego, California.
Schaefer, Ken, "IIS and Kerberos Part 5—Protocol Transition, Constrained Delegation, S4U2S and S4U2P," Jul. 18, 2007, 21 pages, http://www.adopenstatic.com/cs/blogs/ken/archive/2007/07/19/8460.aspx.
Schilit B., "Bootstrapping Location-Enhanced Web Services", University of Washington, Dec. 4, 2003, (http://www.cs.washington.edu/news/colloq.info.html).
Seeley R., "Can Infravio Technology Revive UDDI?", ADTmag.com, Oct. 22, 2003, last accessed Sep. 30, 2004, (http://www.adtmag.com).
Shohoud, Y., "Building XML Web Services with VB.NET and VB 6", Addison Wesley, 2002, pp. 1-14.
Silva, Peter, "DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks," F5 Technical Brief, 2009, pp. 1-10.
Silva, Peter, "DNSSEC: The Antidote to DNS Cache Poisoning and Other DNS Attacks,"F5 Technical Brief, 2009, pp. 1-10.
Sleeper B., "The Evolution of UDDI" UDDI.org White Paper, The Stencil Group, Inc., Jul. 19, 2002, pp. 1-15, San Francisco, California.
Sleeper B., "Why UDDI Will Succeed, Quietly: Two Factors Push Web Services Forward", The Stencil Group, Inc., Apr. 2001, pp. 1-7, San Francisco, California.
Soltis et al., "The Design and Performance of a Shared Disk File System for IRIX," Mar. 23-26, 1998, pp. 1-17, Sixth NASA Goddard Space Flight Center Conference on Mass Storage and Technologies in cooperation with the Fifteenth IEEE Symposium on Mass Storage Systems, University of Minnesota.
Soltis et al., "The Global File System," Sep. 17-19, 1996, in Proceedings of the Fifth NASA Goddard Space Flight Center Conference on Mass Storage Systems and Technologies, College Park, Maryland.
Sommers F., "Whats New in UDDI 3.0—Part 1", Web Services Papers, Jan. 27, 2003, pp. 1-4, last accessed Mar. 31, 2004, (http://www.webservices.org/index.php/articleprint/871/-1/24).
Sommers F., "Whats New in UDDI 3.0—Part 2", Web Services Papers, Mar. 2, 2003, pp. 1-8, last accessed Nov. 1, 2007, (http://www.web.archive.org/web/20040620131006/).
Sommers F., "Whats New in UDDI 3.0—Part 3", Web Services Papers, Sep. 2, 2003, pp. 1-4, last accessed Mar. 31, 2007, (http://www.webservices.org/index.php/article/articleprint/894/-1/24/).
Sorenson, K.M., "Installation and Administration: Kimberlite Cluster Version 1.1.0, Rev. Dec. 2000," Mission Critical Linux, http://oss.missioncriticallinux.corn/kimberlite/kimberlite.pdf.
Stakutis, C., "Benefits of SAN-based file system sharing," Jul. 2000, pp. 1-4, InfoStor, www.infostor.com, last accessed on Dec. 30, 2002.
Tatipamula et al., "IPv6 Integration and Coexistence Strategies for Next-Generation Networks", IEEE Communications Magazine, Jan. 2004, pp. 88-96.
Thekkath et al., "Frangipani: A Scalable Distributed File System," in Proceedings of the 16th ACM Symposium on Operating Systems Principles, Oct. 1997, pp. 114, Association for Computing Machinery, Inc.
Thomson et al., "DNS Extensions to Support IP Version 6," The Internet Society, Network Working Group, RFC 3596, Oct. 2003, pp. 1-8.
Thomson, et al., "DNS Extensions to Support IP Version 6", The Internet Society (Oct. 2003).
Tulloch, Mitch, "Microsoft Encyclopedia of Security," 2003, pp. 218, 300-301, Microsoft Press, Redmond, Washington.
Uesugi, H., English translation of office action dated May 26, 2008 in corresponding Japanese patent application No. 2002-556371.
Uesugi, H., Jul. 15, 2008 letter from Japanese associate reporting office action dated May 26, 2008 in corresponding Japanese patent application No. 2002-556371.
Uesugi, H., Nov. 26, 2008 amendment filed by Japanese associate in response to office action dated May 26, 2008 in corresponding Japanese patent application No. 2002-556371.
Wallace, "Delegating Identity Using X.509 Certificates", IETF Trust, Jul. 29, 2015, 8 pgs.
Wang B., "Priority and Realtime Data Transfer Over the Best-Effort Internet", Dissertation Abstract, 2005, ScholarWorks@UMASS.
Weiler et al., "Minimally Covering NSEC Records and DNSSEC On-line Signing, "Network Working Group, RFC 4470, Apr. 2006, 8 pages, The Internet Society.
Weiler et al., "Minimally Covering NSEC Records and DNSSEC On-line Signing," Network Working Group, RFC 4470, Apr. 2006, 8 pages, The Internet Society.
Wikipedia, "Diameter (protocol)", pp. 1-11, last accessed Oct. 27, 2010, (http://en.wikipedia.org/wiki/Diameter_(protocol)).
Wikipedia, "Domain Name System Security Extensions," <http://en.wikipedia.org/wiki/DNSSEC>, accessed Jun. 3, 2010, pp. 1-20.
Wikipedia, "Domain Name System Security Extensions", retrieved from Internet URL: http://en.wikipedia.org/wiki/DNSSEC (Jun. 2010).
Wikipedia, "IPv6", <http://en.wikipedia.org/wiki/IPv6>, accessed Jun. 3, 2010, 20 pages.
Wikipedia, "IPv6", retrieved from Internet URL: http://en.wikipedia.org/wiki/IPv6 (Jun. 2010).
Wikipedia, "List of DNS record types," <http://en.wikipedia.org/wiki/List_of_DNS_record_types>, Jun. 2010, pp. 1-6.
Wikipedia, "List of DNS record types", retrieved from Internet URL: http://en.wikipedia.org/wiki/List_of_DNS_record_types (Jun. 2010).
Wilkes, J., et al., "The HP AutoRAID Hierarchical Storage System," Feb. 1996, vol. 14, No. 1, ACM Transactions on Computer Systems.
Williams et al., "Forwarding Authentication," The Ultimate Windows Server 2003 System Administrator's Guide, 2003, 2 pages, Figure 10.7, Addison-Wesley Professional, Boston, Massachusetts.
Woo T.Y.C., "A Modular Approach to Packet Classification: Algorithms and Results", Bell Laboratories, Lucent Technologies, Mar. 2000, pp. 1-10.
Xelerance, "DNSX; DNSX Secure Signer; DNSSEC Management Solution," <http://www.xelerance.com/dnssec>.pp. 1-9, Aug. 2009.
Zayas, E., "AFS-3 Programmer's Reference: Architectural Overview," Transarc Corp., version 1.0 of Sep. 2, 1991, doc. No. FS-00-D160.

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210385187A1 (en) * 2018-10-15 2021-12-09 Huawei Technologies Co., Ltd. Method and device for performing domain name resolution by sending key value to grs server
US11245661B2 (en) * 2019-09-05 2022-02-08 Wangsu Science & Technology Co., Ltd. DNS resolution method, authoritative DNS server and DNS resolution system
US11019022B1 (en) * 2020-01-28 2021-05-25 F5 Networks, Inc. Processing packets with returnable values
US20210288937A1 (en) * 2020-03-12 2021-09-16 Vmware, Inc. Domain name service (dns) server cache table validation
US11575646B2 (en) * 2020-03-12 2023-02-07 Vmware, Inc. Domain name service (DNS) server cache table validation
US11949651B2 (en) * 2020-03-12 2024-04-02 VMware LLC Domain name service (DNS) server cache table validation
US11271894B1 (en) * 2021-03-10 2022-03-08 Accenture Global Solutions Limited Systems, devices, and methods for private query and exchange of domain information

Also Published As

Publication number Publication date
US8347100B1 (en) 2013-01-01
US8856898B1 (en) 2014-10-07

Similar Documents

Publication Publication Date Title
USRE47019E1 (en) Methods for DNSSEC proxying and deployment amelioration and systems thereof
US9106699B2 (en) Methods for handling requests between different resource record types and systems thereof
US10778684B2 (en) Systems and methods for securely and transparently proxying SAAS applications through a cloud-hosted or on-premise network gateway for enhanced security and visibility
CA2775245C (en) System and method of federated authentication with reverse proxy
US9444620B1 (en) Methods for binding a session identifier to machine-specific identifiers and systems thereof
US9270646B2 (en) Systems and methods for generating a DNS query to improve resistance against a DNS attack
EP3580906B1 (en) Network security with surrogate digital certificates
US20210329078A1 (en) Secure in-band service detection
US8533453B2 (en) Method and system for configuring a server and dynamically loading SSL information
US11063927B1 (en) Identity-aware application load balancer
KR20060100920A (en) Trusted third party authentication for web services
US10944736B2 (en) Application authentication wrapper
EP3220604B1 (en) Methods for client certificate delegation and devices thereof
US10931662B1 (en) Methods for ephemeral authentication screening and devices thereof
US11323426B2 (en) Method to identify users behind a shared VPN tunnel
US11909876B1 (en) Multi autonomous secure domain name systems
TWI568215B (en) Methods for handling requests between different resource record types and systems thereof
Chetioui et al. Cryptographic Encapsulation in the New ENC-DNSSEC Protocol

Legal Events

Date Code Title Description
MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8