This disclosure relates generally to the technical field of network communication, and in one example embodiment, this disclosure relates to a method, apparatus, and system of a feedback loop to iteratively remove extraneous portions of data in packets to be analyzed.
An application specific integrated circuit may be designed to process a large volume of data to highlight actions of interest according to a network traffic monitoring system. When changes are made to a network device (e.g., a router, a switch), the application specific integrated circuit may no longer be able to process the large volume of data to highlight the actions of interest. As such, investments in engineering time, labor cost, inventory, and/or distribution may be wasted.
The application specific integrated circuit may be expensive to redesign. For example, the application specific integrated circuit may not adapt to changes in a network topology (e.g., routing paths, network nodes, security protocols, communication protocols). When the application specific integrated circuit is inoperable, cybercrime and other illegal activities may be unnoticed and/or increase. As such, law enforcement resources may not be able to prevent illegal activities and threats to public security.
A method, apparatus and system related to an intelligent feedback loop to iteratively reduce target packet analysis is disclosed. In one aspect, a method of a network traffic monitoring system includes processing a flow data received through an aggregation switch of a network traffic monitoring system in a first stage module of the network traffic monitoring system, filtering the flow data to a target data based on a packet classification in the first stage module, determining that a portion of a target data is an extraneous data based on a content filtering algorithm applied in a data processing system of the network traffic monitoring system, and iteratively removing from the target data the extraneous data based on a feedback loop created between the data processing system and the first stage module of the network traffic monitoring system.
The method may involve processing a flow data received through an aggregation switch of a network traffic monitoring system in the first stage and converting the flow data to a target data based on a packet classification in the first stage. The method may also involve applying a content filtering algorithm to the target data in the second stage and communicating which portion of the target data is extraneous from the second stage to the first stage based on the content filtering algorithm. The method may further involve applying a static filtering algorithm of the flow data based on an internet protocol analysis and a port analysis in the first stage, applying a tuple hash algorithm to map the flow data having a variable length into an ordered list of elements having a fixed length of the flow data in the first stage, and dynamically filtering the flow data in the first stage based on the static filtering algorithm and the tuple hash algorithm, and based on a removal of the extraneous data communicated from a filtering intelligence algorithm of the second stage.
The method may further include applying a zero-copy driver and a use buffer in at least one of the first stage and the second stage, reducing processing power and memory usage through the application of the zero-copy driver and the use buffer in the second stage, buffering the target data in a random access memory in the second stage, classifying a set of protocols associated with the target data in the second stage, applying the filtering intelligence algorithm to extract the extraneous data from the target data in the second stage, a determining a communication mode between the second stage and the dynamic filtering operation of the first stage so that a request to remove the extraneous data based on the filtering intelligence algorithm of the second stage is executable.
The method may also involve extracting a meta data associated with the target data in the second stage, communicating the extracted meta data to an data retention server, applying a regex based targeting algorithm to the target data in the second stage to produce a set of regular expressions describing a search pattern and communicating the set of regular expressions to a master controller. The method may further involve analyzing the target data to discover an action of interest in the set of regular expressions associated with a target individual in the second stage. The action of interest may be subject to a governmental permission as to how the action of interest is usable in a lawful data interception system.
In another aspect, a system includes an aggregation switch to consolidate a flow data, a first stage module to create a target data from the flow data through an iterative exclusion of an extraneous data, and a data processing system comprising a processor and a memory to iteratively remove from the target data the extraneous data, and to form a feedback loop between the data processing system and the first stage module of the network traffic monitoring system. The first stage module may process the flow data received through an aggregation switch of the network traffic monitoring system and convert the flow data to a target data based on a packet classification in the first stage. The data processing system may apply a content filtering algorithm to the target data in the data processing system and communicate which portion of the target data is extraneous from the data processing system to the first stage module based on the content filtering algorithm. The first stage module may apply a static filtering algorithm of the flow data based on an internet protocol analysis and a port analysis using the first stage module, a tuple hash algorithm to map the flow data having a variable length into an ordered list of elements having a fixed length of the flow data in the first stage, and dynamically filter the flow data in the first stage based on the static filtering algorithm and the tuple hash algorithm, and based on a removal of the extraneous data communicated from a filtering intelligence algorithm of the data processing system.
The data processing system may further include applying a zero-copy driver and a use buffer in the data processing system, reducing processing power and memory usage through the application of the zero-copy driver and the use buffer in the data processing system, buffering the target data in a random access memory in the data processing system, classifying a set of protocols associated with the target data in the data processing system, applying the filtering intelligence algorithm to extract the extraneous data from the target data in the data processing system, and determining a communication mode between the data processing system and the dynamic filtering operation of the first stage so that a request to remove the extraneous data based on the filtering intelligence algorithm of the data processing system is executable.
The data processing system may further involve extracting a meta data associated with the target data in the data processing system, communicating the extracted meta data to an data retention server, applying a regex based targeting algorithm to the target data in the data processing system to produce a set of regular expressions describing a search pattern, and communicating the set of regular expressions to a master controller. The data processing system may also analyze the target data to discover an action of interest in the set of regular expressions associated with a target individual in the data processing system.
In yet another aspect, a method of a network traffic monitoring system includes processing a flow data received through an aggregation switch of a network traffic monitoring system in a first stage module of the network traffic monitoring system, filtering the flow data to a target data based on a packet classification in the first stage module, determining that a portion of a target data is an extraneous data based on a content filtering algorithm applied in a data processing system of the network traffic monitoring system, and iteratively removing from the target data the extraneous data based on a feedback loop created between the data processing system and the first stage module of the network traffic monitoring system.
The method of a network traffic monitoring system may also involve applying a content filtering algorithm to the target data in the data processing system and communicating which portion of the target data is extraneous from the data processing system to the first stage module based on the content filtering algorithm. The method of a network traffic monitoring system may further involve applying a static filtering algorithm of the flow data based on an internet protocol analysis and a port analysis in the first stage, applying a tuple hash algorithm to map the flow data having a variable length into an ordered list of elements having a fixed length of the flow data in the first stage, and dynamically filtering the flow data in the first stage module based on the static filtering algorithm and the tuple hash algorithm, and based on a removal of the extraneous data communicated from a filtering intelligence algorithm of the data processing system.
The method of a network traffic monitoring system may also include applying a zero-copy driver and a use buffer in the data processing system, reducing processing power and memory usage through the application of the zero-copy driver and the use buffer in the data processing system, buffering the target data in a random access memory in the data processing system, classifying a set of protocols associated with the target data in the data processing system, applying the filtering intelligence algorithm to extract the extraneous data from the target data in the data processing system, and determining a communication mode between the data processing system and the dynamic filtering operation of the first stage module so that a request to remove the extraneous data based on the filtering intelligence algorithm of the data processing system is executable.
The method of a network traffic monitoring system may also include extracting a meta data associated with the target data in the data processing system, communicating the extracted meta data to a data retention server, applying a regex based targeting algorithm to the target data in the data processing system to produce a set of regular expressions describing a search pattern, and communicating the set of regular expressions to a master controller. The method of a network traffic monitoring system may further include analyzing the target data to discover an action of interest in the set of regular expressions associated with a target individual in the data processing system. The action of interest may be subject to a governmental permission as to how the action of interest is usable in a lawful data interception system.
Example embodiments are illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:
Other features of the present embodiments will be apparent from the accompanying drawings and from the detailed description that follows.
Example embodiments, as described below, may be used to provide a method, a system, and/or an apparatus of implementing an intelligent feedback loop to iteratively reduce target packet analysis, according to one or more embodiments. Although the present embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the various embodiments.
In one embodiment, a method of a network traffic monitoring system 200 includes processing a flow data 302 received through an aggregation switch 304 of a network traffic monitoring system 200 in a first stage module 306 of the network traffic monitoring system 200, filtering the flow data 302 to a target data 312 based on a packet classification in the first stage module 306, determining that a portion of a target data 312 is an extraneous data 318 based on a content filtering algorithm applied in a data processing system 308 of the network traffic monitoring system 200, and iteratively removing from the target data 312 the extraneous data 318 based on a feedback loop 206 created between the data processing system 308 and the first stage module 306 of the network traffic monitoring system 200.
In another embodiment, a system includes an aggregation switch 304 to consolidate a flow data 302, a first stage module 306 to create a target data 312 from the flow data 302 through an iterative exclusion of an extraneous data 318, and a data processing system 308 comprising a processor 328 and a random access memory 330 to iteratively remove from the target data 312 the extraneous data 318, and to form a feedback loop 206 between the data processing system 308 and the first stage module 306 of the network traffic monitoring system 200. The first stage module 306 may process the flow data 302 received through an aggregation switch 304 of the network traffic monitoring system 200 and convert the flow data 302 to a target data 312 based on a packet classification in the first stage. The data processing system 308 may apply a content filtering algorithm to the target data 312 in the data processing system 308 and communicate which portion of the target data 312 is extraneous from the data processing system 308 to the first stage module 306 based on the content filtering algorithm. The first stage module 306 may apply a static filtering algorithm of the flow data 302 based on an internet protocol analysis and a port analysis using the first stage module 306, a tuple hash algorithm to map the flow data 302 having a variable length into an ordered list of elements having a fixed length of the flow data 302 in the first stage, and dynamically filter the flow data 302 in the first stage based on the static filtering algorithm and the tuple hash algorithm, and based on a removal of the extraneous data 318 communicated from a filtering intelligence algorithm of the data processing system.
In yet another embodiment, a method of a network traffic monitoring system 200 includes processing a flow data 302 received through an aggregation switch 304 of a network traffic monitoring system 200 in a first stage module 306 of the network traffic monitoring system 200, filtering the flow data 302 to a target data 312 based on a packet classification in the first stage module 306, determining that a portion of a target data 312 is an extraneous data 318 based on a content filtering algorithm applied in a data processing system 308 of the network traffic monitoring system 200, and iteratively removing from the target data 312 the extraneous data 318 based on a feedback loop 206 created between the data processing system 308 and the first stage module 306 of the network traffic monitoring system 200.
A stage (e.g. a first stage 202, a second stage 204) is a singular phase in a series of phases that take place in consecutive fashion with respect to time. A stage may be implemented in software or hardware and may involve the manipulation of data before and/or after additional stages. A series of stages may be orchestrated to perform a particular function. The stages in the series may also be able to establish a communication medium for the purpose of providing feedback to an earlier or a later stage.
The feedback loop 206 may be a control system that allows for feedback and self-correction. The feedback loop 206 may adjusts its operation according to differences between an actual output and a desired output in the second stage 204 of
The extraneous data 318 may be a portion of the target data 312 of
The filtering intelligence circuit 316 may be a hardware component that comprises a set of instructions used to classify the target data 312 in
According to one embodiment, a method of a network traffic monitoring system 200 includes processing a flow data 302 received through an aggregation switch 304 in a first stage module 306 of the network traffic monitoring system 200. The method may also involve filtering the flow data 302 to a target data 312 based on a packet classification performed by a packet classification module 310 in the first stage module 306. The method may also involve determining that a portion of a target data 312 is an extraneous data 318 based on a content filtering algorithm implemented by a content filtering circuit 314 in a data processing system 308 of the network traffic monitoring system 200. Furthermore, the method may also involve iteratively removing from the target data 312 the extraneous data 318 based on a feedback loop 206 created between the data processing system 308 and the first stage module 306 of the network traffic monitoring system 200.
The method of a network traffic monitoring system 200 may involve processing a flow data 302 received through an aggregation switch 304 of a network traffic monitoring system 200 in the first stage 202 and converting the flow data 302 to a target data 312 based on a packet classification performed by a packet classification module 310 in the first stage 202. The method may also involve applying a content filtering algorithm of the content filtering circuit 314 to the target data 312 in the second stage 204 and communicating which portion of the target data 312 is extraneous from the second stage 204 to the first stage 202 based on the content filtering algorithm of the content filtering circuit 314.
In another embodiment, a network traffic monitoring system 200 includes an aggregation switch 304 to consolidate a flow data 302, a first stage module 306 to create a target data 312 from the flow data 302 through an iterative exclusion of an extraneous data 318, and a data processing system 308 comprising a processor 328 and a memory to iteratively remove from the target data 312 the extraneous data 318, and to form a feedback loop 206 between the data processing system 308 and the first stage module 306 of the network traffic monitoring system 200. The first stage module 306 may process the flow data 302 received through an aggregation switch 304 of the network traffic monitoring system 200 and convert the flow data 302 to a target data 312 based on a packet classification performed by a packet classification module 310 in the first stage 202. The data processing system 308 may apply a content filtering algorithm of the content filtering circuit 314 to the target data 312 in the data processing system 308 and communicate which portion of the target data 312 is extraneous from the data processing system 308 to the first stage module 306 based on the content filtering algorithm implemented by the content filtering circuit 314.
In yet another embodiment, a method of a network traffic monitoring system 200 includes processing a flow data 302 received through an aggregation switch 304 in a first stage module 306 of the network traffic monitoring system 200. The method may also involve filtering the flow data 302 to a target data 312 based on a packet classification performed by a packet classification module 310 in the first stage module 306. The method may also involve determining that a portion of a target data 312 is an extraneous data 318 based on a content filtering algorithm implemented by a content filtering circuit 314 in a data processing system 308 of the network traffic monitoring system 200. Furthermore, the method may also involve iteratively removing from the target data 312 the extraneous data 318 based on a feedback loop 206 created between the data processing system 308 and the first stage module 306 of the network traffic monitoring system 200.
The method of a network traffic monitoring system 200 may also involve applying a content filtering algorithm of the content filtering circuit 314 to the target data 312 in the data processing system 308 and communicating which portion of the target data 312 is extraneous from the data processing system 308 to the first stage 202 module based on the content filtering algorithm of the content filtering circuit 314.
In one embodiment, the method of a network traffic monitoring system 200 involves applying a static filtering algorithm implemented by a static filtering module 322 to the flow data 302 based on a port analysis executed by a port analysis module 400 and a protocol analysis executed by a IP analysis module 402 in the first stage 202. The method may also involve applying a tuple hash algorithm implemented by a tuple hash module 324 to map the flow data 302 having a variable length into an ordered list of elements 404 having a fixed length of the flow data 302 in the first stage 202. The method may further involve dynamically filtering the flow data 302 in the first stage 202 based on the static filtering algorithm implemented by a static filtering module 322 and the tuple hash algorithm implemented by a tuple hash module 324, and based on a removal of the extraneous data 318 communicated from a filtering intelligence algorithm implemented by a filtering intelligence circuit 316 of the second stage 204.
In another embodiment, the first stage module 306 of the network traffic monitoring system 200 may apply a static filtering algorithm, implemented by a static filtering module 322, to the flow data 302 based on a port analysis executed by a port analysis module 400 and an internet protocol analysis executed by a IP analysis module 402 using the first stage module 306. The system may also include a tuple hash algorithm implemented by a tuple hash module 324 to map the flow data 302 having a variable length into an ordered list of elements 404 having a fixed length of the flow data 302 in the first stage 202. The system may further involve dynamically filtering the flow data 302 in the first stage 202 based on the static filtering algorithm implemented by a static filtering module 322 and the tuple hash algorithm implemented by a tuple hash module 324, and based on a removal of the extraneous data 318 communicated from a filtering intelligence algorithm implemented by a filtering intelligence circuit 316 of the data processing system 308.
In yet another embodiment, the method of a network traffic monitoring system 200 involves applying a static filtering algorithm implemented by a static filtering module 322 to the flow data 302 based on an internet protocol analysis executed by a IP analysis module 402 and a port analysis executed by a port analysis module 400 in the first stage 202. The method may also involve applying a tuple hash algorithm implemented by a tuple hash module 324 to map the flow data 302 having a variable length into an ordered list of elements 404 having a fixed length of the flow data 302 in the first stage 202. The method may further involve dynamically filtering the flow data 302 in the first stage module 306 based on the static filtering algorithm implemented by a static filtering module 322 and the tuple hash algorithm implemented by a tuple hash module 324, and based on a removal of the extraneous data 318 communicated from a filtering intelligence algorithm implemented by a filtering intelligence circuit 316 of the data processing system 308.
In one embodiment, the method of a network traffic monitoring system 200 includes applying a zero-copy driver 500 and a use buffer 502 in a the first stage 202 and/or the second stage 204 and reducing processing power and memory usage through the application of the zero-copy driver 500 and the use buffer 502 in the second stage 204. The method may involve buffering the target data 312 in a random access memory 330 in the second stage 204. The method may further involve classifying a set of protocols 504 associated with the target data 312 in the second stage 204 and applying the filtering intelligence algorithm implemented by a filtering intelligence circuit 316 to extract the extraneous data 318 from the target data 312 in the second stage 204. Furthermore, the method may further involve determining a communication mode between the second stage 204 and the dynamic filtering operation of the first stage 202 so that a request to remove the extraneous data 320 based on the filtering intelligence algorithm implemented by a filtering intelligence circuit 316 of the second stage 204 is executable.
In another embodiment, the data processing system 308 includes applying a zero-copy driver 500 and a use buffer 502 in the data processing system 308 and reducing processing power and memory usage in the data processing system 308. The data processing system 308 may include buffering the target data 312 in a random access memory 330. The data processing system 308 may also include classifying a set of protocols 504 associated with the target data 312 and applying the filtering intelligence algorithm implemented by a filtering intelligence circuit 316 to extract the extraneous data 318 from the target data 312. Furthermore, the data processing system 308 may also involve determining a communication mode between the data processing system 308 and the dynamic filtering operation of the first stage 202 so that a request to remove the extraneous data 320 based on the filtering intelligence algorithm implemented by a filtering intelligence circuit 316 of the data processing system 308 is executable.
In yet another embodiment, the method of a network traffic monitoring system 200 includes applying a zero-copy driver 500 and a use buffer 502 in the data processing system 308 and reducing processing power and memory usage through the application of the zero-copy driver 500 and the use buffer 502 in the data processing system 308. The method may also include buffering the target data 312 in a random access memory 330 in the data processing system 308. The method may further include classifying a set of protocols 504 associated with the target data 312 in the data processing system 308 and applying the filtering intelligence algorithm implemented by a filtering intelligence circuit 316 to extract the extraneous data 318 from the target data 312 in the data processing system 308. Furthermore, the method may also include determining a communication mode between the data processing system 308 and the dynamic filtering operation of the first stage module 306 so that a request to remove the extraneous data 320 based on the filtering intelligence algorithm implemented by a filtering intelligence circuit 316 of the data processing system 308 is executable.
In one embodiment, the method of a network traffic monitoring system 200 may include applying a regex based targeting algorithm, implemented through a regex based targeting circuit 600, to a target data 612 in the second stage 204 to produce a set of regular expressions 602 describing a search pattern 604. The method may also involve communicating the set of regular expressions 602 to a master controller 606. The method may further involve extracting a meta data 608 associated with the target data 612 in the second stage 204 and communicating the extracted meta data 610 to a data retention server 614.
In another embodiment, the method may involve applying a regex based targeting algorithm, implemented by a regex based targeting circuit 600, to the target data 612 in the data processing system 308 to produce a set of regular expressions 602 describing a search pattern 604. The method may also involve communicating the set of regular expressions 602 to a master controller 606. The method may further involve extracting a meta data 608 associated with the target data 612 in the data processing system 308 and communicating the extracted meta data 610 to a data retention server 614.
In yet another embodiment, the method of a network traffic monitoring system 200 may also include extracting a meta data 608 associated with the target data 612 in the data processing system 308, communicating the extracted meta data 610 to a data retention server 614, applying a regex based targeting algorithm implemented by a regex based targeting circuit 600 to the target data 612 in the data processing system 308 to produce a set of regular expressions 602 describing a search pattern 604, and communicating the set of regular expressions 602 to a master controller 606.
In one embodiment, the method of a network traffic monitoring system 200 includes analyzing the target data 612 to discover an action of interest 706 in the set of regular expressions 602 associated with a target individual 704 in the second stage 204. The action of interest 706 may be subject to a governmental permission 708 as to how the action of interest 706 is usable in a lawful data interception system 710.
In another embodiment, the data processing system 308 includes analyzing the target data 612 to discover an action of interest 706 in the set of regular expressions 602 associated with a target individual 704 in the data processing system 308.
In yet another embodiment, the method of a network traffic monitoring system 200 includes analyzing the target data 612 to discover an action of interest 706 in the set of regular expressions 602 associated with a target individual 704 in the data processing system 308. The action of interest 706 may be subject to a governmental permission 708 as to how the action of interest 706 is usable in a lawful data interception system 710.
An example will now be described in which the various embodiments will be explained in a hypothetical scenario. A government security team named ‘XYZ, Inc.’ may wish to utilize a software program on standard commodity hardware to monitor a network named ‘XYZ Net’ for cybercrime activities. XYZ, Inc. may prefer to use software instead of hardware since software is cheaper to maintain, easier to upgrade, and can be flexible in the way it manipulates data. However, processing data in software may be slower than in hardware. As such XYZ, Inc. may wish to reduce the inflow of network data to 1) enable the use of software instead of expensive custom hardware, and 2) maximize efficiency and minimize redundancies in monitoring data. More specifically, XYZ, Inc. may wish to filter the network data to focus on specific web activities associated with individuals engaging in illegal activity.
Any data entering the XYZ Net network may be classified according to the threat level of the web activities involved with the incoming data. To reduce the amount of data to monitor, XYZ, Inc. may wish to develop a way for the software and the hardware to communicate for the purpose of ignoring certain sources of data, e.g., a web object 712, ads 714, streaming video 716, or a web article 718, all of which can be found in a web browser 702. XYZ, Inc. may wish to ignore this innocuous data in order to focus on actions of interest 706 associating a target individual 704 with an illegal activity.
Although the present embodiments have been described with reference to specific example embodiments, it will be evident that various modifications and changes may be made to these embodiments without departing from the broader spirit and scope of the various embodiments. For example, the various devices and modules described herein may be enabled and operated using hardware circuitry (e.g., CMOS based logic circuitry), firmware, software or any combination of hardware, firmware, and software (e.g., embodied in a machine readable medium). For example, the various electrical structure and methods may be embodied using transistors, logic gates, and electrical circuits (e.g., application specific integrated (ASIC) circuitry and/or Digital Signal Processor (DSP) circuitry).
In addition, it will be appreciated that the various operations, processes, and methods disclosed herein may be embodied in a machine-readable medium and/or a machine accessible medium compatible with a data processing system (e.g., a computer device). Accordingly, the specification and drawings are to be regarded in an illustrative in rather than a restrictive sense.
Number | Name | Date | Kind |
---|---|---|---|
5185860 | Wu | Feb 1993 | A |
5444850 | Chang | Aug 1995 | A |
5475819 | Miller et al. | Dec 1995 | A |
5675741 | Aggarwal et al. | Oct 1997 | A |
5796952 | Davis et al. | Aug 1998 | A |
5835720 | Nelson et al. | Nov 1998 | A |
5878384 | Johnson et al. | Mar 1999 | A |
5944790 | Levy | Aug 1999 | A |
5954797 | Sidey | Sep 1999 | A |
5958010 | Agarwal et al. | Sep 1999 | A |
5987430 | Van Horne et al. | Nov 1999 | A |
5996011 | Humes | Nov 1999 | A |
6006260 | Barrick, Jr. et al. | Dec 1999 | A |
6012088 | Li et al. | Jan 2000 | A |
6055542 | Nielsen et al. | Apr 2000 | A |
6112240 | Pogue et al. | Aug 2000 | A |
6115742 | Franklin et al. | Sep 2000 | A |
6134592 | Montulli | Oct 2000 | A |
6148342 | Ho | Nov 2000 | A |
6151631 | Ansell et al. | Nov 2000 | A |
6182075 | Hsu | Jan 2001 | B1 |
6289341 | Barney | Sep 2001 | B1 |
6314460 | Knight et al. | Nov 2001 | B1 |
6317792 | Mundy et al. | Nov 2001 | B1 |
6321336 | Applegate et al. | Nov 2001 | B1 |
6321338 | Porras et al. | Nov 2001 | B1 |
6327619 | Blumenau | Dec 2001 | B1 |
6359557 | Bilder | Mar 2002 | B2 |
6373838 | Law et al. | Apr 2002 | B1 |
6377987 | Kracht | Apr 2002 | B1 |
6393461 | Okada et al. | May 2002 | B1 |
6393479 | Glommen et al. | May 2002 | B1 |
6404860 | Casellini | Jun 2002 | B1 |
6425007 | Messinger | Jul 2002 | B1 |
6442590 | Inala et al. | Aug 2002 | B1 |
6449604 | Hansen et al. | Sep 2002 | B1 |
6466981 | Levy | Oct 2002 | B1 |
6466984 | Naveh et al. | Oct 2002 | B1 |
6470386 | Combar et al. | Oct 2002 | B1 |
6516345 | Kracht | Feb 2003 | B1 |
6564261 | Gudjonsson et al. | May 2003 | B1 |
6591251 | Leon et al. | Jul 2003 | B1 |
6658465 | Touboul | Dec 2003 | B1 |
6665715 | Houri | Dec 2003 | B1 |
6678720 | Matsumoto et al. | Jan 2004 | B1 |
6714977 | Fowler et al. | Mar 2004 | B1 |
6721726 | Swaminathan et al. | Apr 2004 | B1 |
6725377 | Kouznetsov | Apr 2004 | B1 |
6760761 | Sciacca | Jul 2004 | B1 |
6782421 | Soles et al. | Aug 2004 | B1 |
6792458 | Muret et al. | Sep 2004 | B1 |
6795856 | Bunch | Sep 2004 | B1 |
6804701 | Muret et al. | Oct 2004 | B2 |
6816455 | Goldberg et al. | Nov 2004 | B2 |
6892226 | Tso et al. | May 2005 | B1 |
6925454 | Lam et al. | Aug 2005 | B2 |
6941321 | Schuetze et al. | Sep 2005 | B2 |
6957229 | Dyor | Oct 2005 | B1 |
6973577 | Kouznetsov | Dec 2005 | B1 |
6981047 | Hanson et al. | Dec 2005 | B2 |
6983317 | Bishop et al. | Jan 2006 | B1 |
6985901 | Sachse et al. | Jan 2006 | B1 |
7006508 | Bondy et al. | Feb 2006 | B2 |
7027398 | Fang | Apr 2006 | B2 |
7027416 | Kriz | Apr 2006 | B1 |
7031941 | Garrow et al. | Apr 2006 | B2 |
7046247 | Hao et al. | May 2006 | B2 |
7047294 | Johnson et al. | May 2006 | B2 |
7050396 | Cohen et al. | May 2006 | B1 |
7055174 | Cope et al. | May 2006 | B1 |
7058976 | Dark | Jun 2006 | B1 |
7076275 | Karstens et al. | Jul 2006 | B1 |
7083095 | Hendrick | Aug 2006 | B2 |
7093020 | McCarty et al. | Aug 2006 | B1 |
7143151 | Kayashima et al. | Nov 2006 | B1 |
7152103 | Ryan et al. | Dec 2006 | B1 |
7152108 | Khan et al. | Dec 2006 | B1 |
7171681 | Duncan et al. | Jan 2007 | B1 |
7203674 | Cohen | Apr 2007 | B2 |
7206835 | Kusumoto et al. | Apr 2007 | B2 |
7212491 | Koga | May 2007 | B2 |
7216110 | Ogg et al. | May 2007 | B1 |
7228566 | Caceres et al. | Jun 2007 | B2 |
7231448 | O'Steen et al. | Jun 2007 | B1 |
7246162 | Tindal | Jul 2007 | B2 |
7257722 | Sone | Aug 2007 | B2 |
7277938 | Duimovich et al. | Oct 2007 | B2 |
7277941 | Ignatius et al. | Oct 2007 | B2 |
7278037 | Sone | Oct 2007 | B2 |
7313625 | Tindal et al. | Dec 2007 | B2 |
7328242 | McCarthy et al. | Feb 2008 | B1 |
7346658 | Simpson | Mar 2008 | B2 |
7356576 | Rabe | Apr 2008 | B2 |
7359967 | Synnestvedt et al. | Apr 2008 | B1 |
7373399 | Steele et al. | May 2008 | B2 |
7376722 | Sim et al. | May 2008 | B1 |
7386613 | Piccirilli et al. | Jun 2008 | B2 |
7406516 | Davis et al. | Jul 2008 | B2 |
7447909 | Reith | Nov 2008 | B2 |
7466690 | Schrodi | Dec 2008 | B2 |
7472412 | Wolf et al. | Dec 2008 | B2 |
7474617 | Molen et al. | Jan 2009 | B2 |
7478161 | Bernet et al. | Jan 2009 | B2 |
7490065 | Ogg et al. | Feb 2009 | B1 |
7496049 | Estrada et al. | Feb 2009 | B2 |
7506072 | Waldorf et al. | Mar 2009 | B2 |
7523191 | Thomas et al. | Apr 2009 | B1 |
7526541 | Roese et al. | Apr 2009 | B2 |
7535993 | Cai et al. | May 2009 | B2 |
7536459 | Johnson et al. | May 2009 | B2 |
7570743 | Barclay et al. | Aug 2009 | B2 |
7571237 | Pfitzmann | Aug 2009 | B2 |
7580356 | Mishra et al. | Aug 2009 | B1 |
7587453 | Bhrara et al. | Sep 2009 | B2 |
7587757 | Scoggins et al. | Sep 2009 | B2 |
7624144 | Mitrov | Nov 2009 | B1 |
7627664 | Sutou et al. | Dec 2009 | B2 |
7631007 | Morris | Dec 2009 | B2 |
7636680 | Gatto | Dec 2009 | B2 |
7639613 | Ghannadian et al. | Dec 2009 | B1 |
7647406 | Liu | Jan 2010 | B2 |
7657540 | Bayliss | Feb 2010 | B1 |
7664974 | Sone | Feb 2010 | B2 |
7676570 | Levy et al. | Mar 2010 | B2 |
7698457 | Ghetie et al. | Apr 2010 | B2 |
7730120 | Singh et al. | Jun 2010 | B2 |
7769851 | Guruswamy et al. | Aug 2010 | B1 |
7769873 | Mackie | Aug 2010 | B1 |
7779073 | Hoile et al. | Aug 2010 | B2 |
7788330 | Goggin | Aug 2010 | B2 |
7809826 | Guruswamy | Oct 2010 | B1 |
7852849 | Davidson et al. | Dec 2010 | B2 |
7873719 | Bishop et al. | Jan 2011 | B2 |
7885194 | Narin et al. | Feb 2011 | B1 |
7886049 | Adelstein et al. | Feb 2011 | B2 |
7904478 | Yu et al. | Mar 2011 | B2 |
7904554 | Lu et al. | Mar 2011 | B1 |
7933926 | Ebert | Apr 2011 | B2 |
7953851 | Britton et al. | May 2011 | B2 |
7958233 | Fernández Gutierrez | Jun 2011 | B2 |
7958267 | Eiras et al. | Jun 2011 | B1 |
7969875 | Lin | Jun 2011 | B2 |
7975046 | Sheppard | Jul 2011 | B2 |
7979521 | Greaves et al. | Jul 2011 | B2 |
7979529 | Kreusch et al. | Jul 2011 | B2 |
7996493 | Hill | Aug 2011 | B2 |
8001246 | Lu et al. | Aug 2011 | B2 |
8010085 | Apte et al. | Aug 2011 | B2 |
8010602 | Shen et al. | Aug 2011 | B2 |
8010689 | Deninger et al. | Aug 2011 | B2 |
8014303 | Narin et al. | Sep 2011 | B2 |
8015277 | Brown et al. | Sep 2011 | B2 |
8032701 | Glade et al. | Oct 2011 | B1 |
8041022 | Andreasen et al. | Oct 2011 | B1 |
8051130 | Logan et al. | Nov 2011 | B2 |
8051168 | Boysko et al. | Nov 2011 | B1 |
8055709 | Singh et al. | Nov 2011 | B2 |
8059790 | Paterik et al. | Nov 2011 | B1 |
8077704 | Yin et al. | Dec 2011 | B2 |
8078679 | Kajekar et al. | Dec 2011 | B2 |
8090852 | Ianchici et al. | Jan 2012 | B2 |
8099500 | Deason | Jan 2012 | B2 |
8117314 | Croft et al. | Feb 2012 | B2 |
8127005 | Fernández Gutierrez | Feb 2012 | B2 |
8135134 | Orsini et al. | Mar 2012 | B2 |
8135833 | Cancel et al. | Mar 2012 | B2 |
8145753 | Inoue et al. | Mar 2012 | B2 |
8156155 | Yu et al. | Apr 2012 | B1 |
8200809 | Sheppard | Jun 2012 | B2 |
8204884 | Freedman et al. | Jun 2012 | B2 |
8230056 | Bishop et al. | Jul 2012 | B2 |
8234368 | Nielsen et al. | Jul 2012 | B1 |
8244859 | Ramakrishnan et al. | Aug 2012 | B2 |
8274979 | Bragagnini et al. | Sep 2012 | B2 |
8281027 | Martinez et al. | Oct 2012 | B2 |
8281175 | Blackburn et al. | Oct 2012 | B2 |
8281360 | Flewallen et al. | Oct 2012 | B2 |
8316134 | Tanimoto | Nov 2012 | B2 |
8321515 | Gailloux et al. | Nov 2012 | B1 |
8327012 | Nguyen et al. | Dec 2012 | B1 |
8332477 | Kaiserlian et al. | Dec 2012 | B1 |
8332507 | Wagh et al. | Dec 2012 | B2 |
8339959 | Moisand et al. | Dec 2012 | B1 |
8352590 | Sankaran et al. | Jan 2013 | B2 |
8380234 | Kronander et al. | Feb 2013 | B2 |
8380863 | Natarajan et al. | Feb 2013 | B2 |
8396075 | Skoczkowski et al. | Mar 2013 | B2 |
8407038 | Bizzarri et al. | Mar 2013 | B2 |
8416695 | Liu et al. | Apr 2013 | B2 |
8438089 | Wasserblat et al. | May 2013 | B1 |
8478879 | Brown et al. | Jul 2013 | B2 |
8479212 | Jamjoom et al. | Jul 2013 | B2 |
8527577 | Lu et al. | Sep 2013 | B2 |
8542592 | Moisand et al. | Sep 2013 | B2 |
8542676 | Lakhani et al. | Sep 2013 | B2 |
8544023 | Sim-Tang et al. | Sep 2013 | B2 |
8572252 | Ahuja et al. | Oct 2013 | B2 |
8589516 | Wheeler et al. | Nov 2013 | B2 |
8595490 | Von Mueller et al. | Nov 2013 | B2 |
8621090 | Bustamente | Dec 2013 | B2 |
8626860 | Gailloux et al. | Jan 2014 | B1 |
8627479 | Wittenstein et al. | Jan 2014 | B2 |
8630836 | Wasser | Jan 2014 | B2 |
8630854 | Marvit | Jan 2014 | B2 |
8634423 | Olding et al. | Jan 2014 | B1 |
8698872 | Begeja et al. | Apr 2014 | B2 |
8712019 | Anchan et al. | Apr 2014 | B2 |
8713453 | Shahine et al. | Apr 2014 | B2 |
8725869 | Reiner et al. | May 2014 | B1 |
8756312 | Malloy et al. | Jun 2014 | B2 |
8769059 | Chheda et al. | Jul 2014 | B1 |
8782283 | Attanasio | Jul 2014 | B2 |
8793395 | Cadiou et al. | Jul 2014 | B2 |
8812740 | Li et al. | Aug 2014 | B2 |
8813090 | Jamjoom et al. | Aug 2014 | B2 |
20010052081 | McKibben et al. | Dec 2001 | A1 |
20020026505 | Terry | Feb 2002 | A1 |
20020042821 | Muret et al. | Apr 2002 | A1 |
20020078382 | Sheikh et al. | Jun 2002 | A1 |
20020099818 | Russell et al. | Jul 2002 | A1 |
20020174235 | Likourezos | Nov 2002 | A1 |
20030023715 | Reiner et al. | Jan 2003 | A1 |
20030043820 | Goringe et al. | Mar 2003 | A1 |
20030059017 | Cugalj et al. | Mar 2003 | A1 |
20030065605 | Gatto | Apr 2003 | A1 |
20030120822 | Langrind et al. | Jun 2003 | A1 |
20030140131 | Chandrashekhar et al. | Jul 2003 | A1 |
20030214504 | Hao et al. | Nov 2003 | A1 |
20040022191 | Bernet et al. | Feb 2004 | A1 |
20040049693 | Douglas | Mar 2004 | A1 |
20040105424 | Skoczkowski et al. | Jun 2004 | A1 |
20040181599 | Kreusch et al. | Sep 2004 | A1 |
20040199623 | Houri | Oct 2004 | A1 |
20040202295 | Shen et al. | Oct 2004 | A1 |
20040215770 | Maher, III et al. | Oct 2004 | A1 |
20040249938 | Bunch | Dec 2004 | A1 |
20040255126 | Reith | Dec 2004 | A1 |
20040267729 | Swaminathan et al. | Dec 2004 | A1 |
20050013259 | Papoushado et al. | Jan 2005 | A1 |
20050076117 | Hou et al. | Apr 2005 | A1 |
20050174937 | Scoggins et al. | Aug 2005 | A1 |
20050246419 | Jaatinen | Nov 2005 | A1 |
20060015613 | Greaves | Jan 2006 | A1 |
20060026268 | Sanda | Feb 2006 | A1 |
20060041660 | Bishop et al. | Feb 2006 | A1 |
20060064391 | Petrov et al. | Mar 2006 | A1 |
20060109847 | Satou | May 2006 | A1 |
20060168332 | Pfitzmann | Jul 2006 | A1 |
20070055766 | Petropoulakis et al. | Mar 2007 | A1 |
20070083924 | Lu | Apr 2007 | A1 |
20070156889 | Bhrara et al. | Jul 2007 | A1 |
20070203991 | Fisher et al. | Aug 2007 | A1 |
20070266145 | Nesbitt et al. | Nov 2007 | A1 |
20080028031 | Bailey et al. | Jan 2008 | A1 |
20080036767 | Janzen | Feb 2008 | A1 |
20080052392 | Webster et al. | Feb 2008 | A1 |
20080147623 | Swaminathan et al. | Jun 2008 | A1 |
20080162397 | Zaltzman | Jul 2008 | A1 |
20080183867 | Singh et al. | Jul 2008 | A1 |
20090052443 | Kolenchery et al. | Feb 2009 | A1 |
20090077623 | Baum et al. | Mar 2009 | A1 |
20090132450 | Schlottmann | May 2009 | A1 |
20090150472 | Devarakonda et al. | Jun 2009 | A1 |
20090165142 | Adelstein et al. | Jun 2009 | A1 |
20090171960 | Katzir | Jul 2009 | A1 |
20090193037 | Yu et al. | Jul 2009 | A1 |
20090254653 | Kowa et al. | Oct 2009 | A1 |
20100042545 | Ogg et al. | Feb 2010 | A1 |
20100057858 | Shen et al. | Mar 2010 | A1 |
20100071053 | Ansari et al. | Mar 2010 | A1 |
20100079464 | Matsumura | Apr 2010 | A1 |
20100094910 | Bayliss | Apr 2010 | A1 |
20100095017 | Ghetie et al. | Apr 2010 | A1 |
20100115018 | Yoon et al. | May 2010 | A1 |
20100150138 | Bjorsell et al. | Jun 2010 | A1 |
20100182320 | Cartan | Jul 2010 | A1 |
20100199189 | Ben-Aroya et al. | Aug 2010 | A1 |
20100211672 | Brown et al. | Aug 2010 | A1 |
20100217837 | Ansari et al. | Aug 2010 | A1 |
20100228854 | Morrison et al. | Sep 2010 | A1 |
20100250497 | Redlich et al. | Sep 2010 | A1 |
20100281161 | Cohn et al. | Nov 2010 | A1 |
20100287286 | Bustamente | Nov 2010 | A1 |
20100309786 | Moisand et al. | Dec 2010 | A1 |
20100312884 | Nandy et al. | Dec 2010 | A1 |
20100312903 | Miyata | Dec 2010 | A1 |
20100318647 | Savoor et al. | Dec 2010 | A1 |
20100321183 | Donovan et al. | Dec 2010 | A1 |
20110010449 | Andrews et al. | Jan 2011 | A1 |
20110029667 | Imbimbo et al. | Feb 2011 | A1 |
20110030067 | Wilson | Feb 2011 | A1 |
20110047273 | Young, Jr. et al. | Feb 2011 | A1 |
20110161507 | O'Sullivan et al. | Jun 2011 | A1 |
20110173330 | Gong et al. | Jul 2011 | A1 |
20110182205 | Gerdes et al. | Jul 2011 | A1 |
20110206198 | Freedman et al. | Aug 2011 | A1 |
20110208859 | Fernández Gutierrez | Aug 2011 | A1 |
20110252032 | Fitzgerald et al. | Oct 2011 | A1 |
20110270977 | Ansiaux et al. | Nov 2011 | A1 |
20110283343 | Jaeger et al. | Nov 2011 | A1 |
20110289134 | De Los Reyes et al. | Nov 2011 | A1 |
20110296014 | Cancel et al. | Dec 2011 | A1 |
20120005331 | Beattie, Jr. et al. | Jan 2012 | A1 |
20120084081 | Melamed et al. | Apr 2012 | A1 |
20120096145 | Le et al. | Apr 2012 | A1 |
20120110062 | Savage et al. | May 2012 | A1 |
20120117236 | Fukuda et al. | May 2012 | A1 |
20120143972 | Malik et al. | Jun 2012 | A1 |
20120150955 | Tseng | Jun 2012 | A1 |
20120158955 | Kim et al. | Jun 2012 | A1 |
20120191854 | Bharatia et al. | Jul 2012 | A1 |
20120197976 | Welingkar et al. | Aug 2012 | A1 |
20120203847 | Kendall et al. | Aug 2012 | A1 |
20120224021 | Begeja et al. | Sep 2012 | A1 |
20120239805 | Savoor et al. | Sep 2012 | A1 |
20120254403 | Imbimbo et al. | Oct 2012 | A1 |
20120259975 | Le et al. | Oct 2012 | A1 |
20120265824 | Lawbaugh | Oct 2012 | A1 |
20120317196 | Schigel et al. | Dec 2012 | A1 |
20120324470 | Jamjoom et al. | Dec 2012 | A1 |
20120331126 | Abdul-Razzak et al. | Dec 2012 | A1 |
20130007129 | German et al. | Jan 2013 | A1 |
20130024506 | Setton | Jan 2013 | A1 |
20130091241 | Goetz et al. | Apr 2013 | A1 |
20130097308 | Le et al. | Apr 2013 | A1 |
20130155068 | Bier et al. | Jun 2013 | A1 |
20130159234 | Xing et al. | Jun 2013 | A1 |
20130191493 | Le et al. | Jul 2013 | A1 |
20130207980 | Ankisettipalli et al. | Aug 2013 | A1 |
20130262622 | Li et al. | Oct 2013 | A1 |
20130268443 | Petrov et al. | Oct 2013 | A1 |
20130275306 | Ignatchenko et al. | Oct 2013 | A1 |
20130293551 | Erez et al. | Nov 2013 | A1 |
20130304761 | Redlich et al. | Nov 2013 | A1 |
20130311557 | Aston Motes et al. | Nov 2013 | A1 |
20140059024 | Le et al. | Feb 2014 | A1 |
20140082087 | Bustamente | Mar 2014 | A1 |
20140086102 | Doddapaneni | Mar 2014 | A1 |
20140149487 | Dikmen et al. | May 2014 | A1 |
20140150077 | Roy et al. | May 2014 | A1 |
20140222522 | Chait | Aug 2014 | A1 |
20150200967 | Redlich | Jul 2015 | A1 |
20150215186 | Alonso Franco et al. | Jul 2015 | A1 |
Number | Date | Country |
---|---|---|
2001077357 | Mar 2001 | JP |
Entry |
---|
“Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list”, by Yang Xiang et al., Jul. 14, 2005 (pp. 15) http://ai.arizona.edu/intranet/papers/VisualizingCriminalRelationships.pdf. |
“Securing Public Instant Messaging (IM) at Work”, by Nigel Williams, Joanne Ly, Jul. 2004 (pp. 43) http://caia.swin.edu.au/reports/040726A/CAIA-TR-040726A.pdf. |
“Network Element Service Specification Template”, by S. Shenker et al., Sep. 1997 (pp. 22) http://tools.ietf.org/pdf/rfc2216.pdf. |
“RSVP+: An Extension to RSVP”, by Silvano Gai et al., Jun. 1999 (pp. 18) http://tools.ietf.org/pdf/draft-sgai-rsvp-plus-00.pdf. |
“Cellular access control and charging for mobile operator wireless local area networks”, by H. Haverinen et al., Jan. 14, 2003 (p. 1) http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=1160081&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs—all.jsp%3Farnumber%3D1160081. |
“An Analysis of Anonymity in the Bitcoin System”, by Reid Fergal et al., May 7, 2012 (pp. 30) http://arxiv.org/pdf/1107.4524.pdf?origin=publication—detail. |
Number | Date | Country | |
---|---|---|---|
20140086102 A1 | Mar 2014 | US |