This technology generally relates to network security and, more particularly, to facilitating improved cipher selection.
Prior to constructing a secure channel with Transport Layer Security (TLS)/Secure Sockets Layer (SSL) (referred to herein as SSL), network devices must exchange and agree upon a number of security parameters in order to provide confidentiality, authentication, and message integrity. Security parameters presented for negotiating secure network sessions are represented in a string referred to as a cipher suite. Ciphers suites can have any number of associated attributes and belong to one or more cipher suite sets (e.g., Perfect Forward Secrecy (PFS) or Federal Information Processing Standard (FIPS) cipher suite sets).
As one exemplary device, network traffic management apparatuses can facilitate SSL sessions with and between both client devices and server devices in some implementations. Network traffic management apparatuses also can implement security policies to protect server devices, and, in particular, applications hosted on the server devices, from malicious network traffic. Previously, in order to configure SSL on network traffic management apparatuses, an administrator had to translate security policies (e.g., for the applications hosted on the server devices) into a text-based list of cipher suites, ordered based on priority, which is referred to herein as a cipher string.
However, significant knowledge of cryptography is generally required in order to determine whether selected cipher suites are secure enough to meet security policy requirements, are hardware accelerated, support particular web browsers, or enable specific features (e.g., PFS), for example. Accordingly, generating cipher strings is currently a complex process that is error-prone, and often results in cipher strings that are not aligned with security policies, leading to vulnerabilities that can be exploited by malicious actors.
A method for facilitating improved cipher selection implemented by a network traffic management system comprising one or more network traffic management apparatuses, administrator devices, client devices, or server devices, the method including obtaining one or more custom selection rules and one or more custom priority rules via a graphical user interface (GUI). One or more of the custom selection rules are applied to a cipher suite database to generate a result set of cipher suites. The cipher suite database includes a plurality of cipher suite sets. One or more of the custom priority rules are applied to the result set of cipher suites to generate an ordered result set of cipher suites. A cipher string is generated based on the ordered result set of cipher suites. The cipher string is stored in a secure socket layer (SSL) profile to be used during negotiation of secure network sessions.
A network traffic management apparatus, comprising memory comprising programmed instructions stored thereon and one or more processors configured to be capable of executing the stored programmed instructions to obtain one or more custom selection rules and one or more custom priority rules via a GUI. One or more of the custom selection rules are applied to a cipher suite database to generate a result set of cipher suites. The cipher suite database includes a plurality of cipher suite sets. One or more of the custom priority rules are applied to the result set of cipher suites to generate an ordered result set of cipher suites. A cipher string is generated based on the ordered result set of cipher suites. The cipher string is stored in a SSL profile to be used during negotiation of secure network sessions.
A non-transitory computer readable medium having stored thereon instructions for facilitating improved cipher selection comprising executable code which when executed by one or more processors, causes the processors to obtain one or more custom selection rules and one or more custom priority rules via a GUI. One or more of the custom selection rules are applied to a cipher suite database to generate a result set of cipher suites. The cipher suite database includes a plurality of cipher suite sets. One or more of the custom priority rules are applied to the result set of cipher suites to generate an ordered result set of cipher suites. A cipher string is generated based on the ordered result set of cipher suites. The cipher string is stored in a SSL profile to be used during negotiation of secure network sessions.
A network traffic management system, comprising one or more network traffic management apparatuses, administrator devices, client devices, or server devices, the network traffic management system comprising memory comprising programmed instructions stored thereon and one or more processors configured to be capable of executing the stored programmed instructions to obtain one or more custom selection rules and one or more custom priority rules via a GUI. One or more of the custom selection rules are applied to a cipher suite database to generate a result set of cipher suites. The cipher suite database includes a plurality of cipher suite sets. One or more of the custom priority rules are applied to the result set of cipher suites to generate an ordered result set of cipher suites. A cipher string is generated based on the ordered result set of cipher suites. The cipher string is stored in a SSL profile to be used during negotiation of secure network sessions.
This technology has a number of associated advantages including providing methods, non-transitory computer readable media, network traffic management apparatuses, and network traffic management systems that facilitate more accurate cipher strings, resulting in improved network security. With this technology, custom selection and priority rules are used to more effectively facilitate generation of cipher strings. The custom selection rules advantageously support multiple constraints simultaneously, as well as exclusion of certain sets of cipher suites sharing particular attributes. Accordingly, this technology allows administrators to establish SSL configurations with cipher strings in a more efficient and accurate manner.
Referring to
Referring to
The processor(s) 22 of the network traffic management apparatus 12 may execute programmed instructions stored in the memory 24 of the network traffic management apparatus 12 for the any number of the functions identified above. The processor(s) 22 of the network traffic management apparatus 12 may include one or more CPUs or general purpose processors with one or more processing cores, for example, although other types of processor(s) can also be used.
The memory 24 of the network traffic management apparatus 12 stores these programmed instructions for one or more aspects of the present technology as described and illustrated herein, although some or all of the programmed instructions could be stored elsewhere. A variety of different types of memory storage devices, such as random access memory (RAM), read only memory (ROM), hard disk, solid state drives, flash memory, or other computer readable medium which is read from and written to by a magnetic, optical, or other reading and writing system that is coupled to the processor(s), can be used for the memory 24.
Accordingly, the memory 24 of the network traffic management apparatus 12 can store one or more applications that can include computer executable instructions that, when executed by the network traffic management apparatus 12, cause the network traffic management apparatus 12 to perform actions, such as to transmit, receive, or otherwise process messages, for example, and to perform other actions described and illustrated below with reference to
Even further, the application(s) may be operative in a cloud-based computing environment. The application(s) can be executed within or as virtual machine(s) or virtual server(s) that may be managed in a cloud-based computing environment. Also, the application(s), and even the network traffic management apparatus 12 itself, may be located in virtual server(s) running in a cloud-based computing environment rather than being tied to one or more specific physical network computing devices. Also, the application(s) may be running in one or more virtual machines (VMs) executing on the network traffic management apparatus 12. Additionally, in one or more embodiments of this technology, virtual machine(s) running on the network traffic management apparatus 12 may be managed or supervised by a hypervisor.
In this particular example, the memory 24 of the network traffic management apparatus 12 includes a cipher selection module 30, a cipher database 32, and SSL profile(s) 34, although the memory 24 can include other policies, modules, databases, or applications, for example. The cipher selection module 30 is configured to generate graphical user interfaces (GUIs) for facilitating the submission of custom selection and priority rules and the generation of cipher strings. The GUIs can be provided to the administrator device 18, for example, and allow an administrator to more effectively generate cipher strings that are aligned with security policies for applications hosted by the server devices 14(1)-14(n).
The cipher database 32 stores a plurality of cipher suites, optionally organized as cipher suite sets. The cipher database 32 further includes attributes associated with each of the cipher suite sets that are shared by the cipher suites that comprise the cipher suite sets, and/or attributes associated with each of the cipher suites separate from those of an associated cipher suite set, for example. The cipher database 32 can also store custom groups of cipher suites that may be generated by the cipher selection module 30, for example. Accordingly, the cipher selection module 30 can use the cipher database 32 to apply custom selection rules in order to identify the cipher suites to include in a cipher string for a configuration, as described and illustrated in more detail later.
The SSL profile(s) 34 store configurations including cipher strings that may be application or operating system specific, for example. The SSL profile(s) 34 are used by the network traffic management apparatus 12 when negotiating secure channels or SSL sessions with other network devices, such as one of the client devices 16(1)-16(n) or server devices 14(1)-14(n), for example. Accordingly, the cipher selection module 30 can output a cipher string that is stored in one of the SSL profile(s) 34 associated with an application hosted by one of the server devices 14(1)-14(n), for example, and used to facilitate communication with the application via SSL sessions.
In another example, one or more of the SSL profile(s) 34 can reference a set of rules that, when executed, can establish the configuration of cipher suites to be implemented. In this example, the rules facilitate more efficient on-going management based on rule and/or cipher database 32 updates as compared to one or more of the SSL profile(s) 34 that merely include the output from a single execution of rules (e.g., an ordered result set of cipher suites).
The communication interface 26 of the network traffic management apparatus 12 operatively couples and communicates between the network traffic management apparatus 12, the server devices 14(1)-14(n), the client devices 16(1)-16(n), and/or the administrator device 18, which are all coupled together by the communication network(s) 20, although other types and/or numbers of communication networks or systems with other types and/or numbers of connections and/or configurations to other devices and/or elements can also be used.
By way of example only, the communication network(s) 20 can include local area network(s) (LAN(s)) or wide area network(s) (WAN(s)), and can use TCP/IP over Ethernet and industry-standard protocols, although other types and/or numbers of protocols and/or communication networks can be used. The communication network(s) 20 in this example can employ any suitable interface mechanisms and network communication technologies including, for example, teletraffic in any suitable form (e.g., voice, modem, and the like), Public Switched Telephone Network (PSTNs), Ethernet-based Packet Data Networks (PDNs), combinations thereof, and the like. The communication network(s) 20 can also include direct connection(s) (e.g., for when a device illustrated in
While the network traffic management apparatus 12 is illustrated in this example as including a single device, the network traffic management apparatus 12 in other examples can include a plurality of devices or blades each having one or more processors (each processor with one or more processing cores) that implement one or more steps of this technology. In these examples, one or more of the devices can have a dedicated communication interface or memory. Alternatively, one or more of the devices can utilize the memory, communication interface, or other hardware or software components of one or more other devices included in the network traffic management apparatus 12.
Additionally, one or more of the devices that together comprise the network traffic management apparatus 12 in other examples can be standalone devices or integrated with one or more other devices or apparatuses, such as one of the server devices 14(1)-14(n), for example. Moreover, one or more of the devices of the network traffic management apparatus 12 in these examples can be in a same or a different communication network including one or more public, private, or cloud networks, for example.
Each of the server devices 14(1)-14(n) of the network traffic management system 10 in this example includes one or more processors, a memory, and a communication interface, which are coupled together by a bus or other communication link, although other numbers and/or types of network devices could be used. The server devices 14(1)-14(n) in this example process requests received from the client devices 16(1)-16(n) via the communication network(s) 20 according to the HTTP-based application RFC protocol, for example. Various applications may be operating on the server devices 14(1)-14(n) and transmitting data (e.g., files or Web pages) to the client devices 16(1)-16(n) via the network traffic management apparatus 12 in response to requests from the client devices 16(1)-16(n). The server devices 14(1)-14(n) may be hardware or software or may represent a system with multiple servers in a pool, which may include internal or external networks.
Although the server devices 14(1)-14(n) are illustrated as single devices, one or more actions of each of the server devices 14(1)-14(n) may be distributed across one or more distinct network computing devices that together comprise one or more of the server devices 14(1)-14(n). Moreover, the server devices 14(1)-14(n) are not limited to a particular configuration. Thus, the server devices 14(1)-14(n) may contain a plurality of network computing devices that operate using a master/slave approach, whereby one of the network computing devices of the server devices 14(1)-14(n) operate to manage and/or otherwise coordinate operations of the other network computing devices. The server devices 14(1)-14(n) may operate as a plurality of network computing devices within a cluster architecture, a peer-to peer architecture, virtual machines, or within a cloud architecture, for example.
Thus, the technology disclosed herein is not to be construed as being limited to a single environment and other configurations and architectures are also envisaged. For example, one or more of the server devices 14(1)-14(n) can operate within the network traffic management apparatus 12 itself rather than as a stand-alone server device communicating with the network traffic management apparatus 12 via the communication network(s) 20. In this example, the one or more server devices 14(1)-14(n) operate within the memory 24 of the network traffic management apparatus 12.
The client devices 16(1)-16(n) of the network traffic management system 10 in this example include any type of computing device that can request and receive content stored by the server devices 14(1)-14(n) over the communication network(s) 20 using SSL, such as mobile computing devices, desktop computing devices, laptop computing devices, tablet computing devices, virtual machines (including cloud-based computers), or the like. Each of the client devices 16(1)-16(n) in this example include a processor, a memory, and a communication interface, which are coupled together by a bus or other communication link, although other numbers and/or types of network devices could be used.
The client devices 16(1)-16(n) may run interface applications, such as standard web browsers or standalone client applications, which may provide an interface to make requests for, and receive content stored on, one or more of the server devices 14(1)-14(n) via the communication network(s) 10. The client devices 16(1)-16(n) may further include a display device, such as a display screen or touchscreen, and/or an input device, such as a keyboard for example.
The administrator device 18 in this example includes a processor, a memory, and a communication interface, which are coupled together by a bus or other communication link, although other numbers and types of network devices could be used. The administrator device 18 may also include an input device and a display device and may run interface applications, such as a web browser, that may provide an interface for an administrator to manipulate GUIs provided by the cipher selection module 30 of the network traffic management apparatus 12, for example, as described and illustrated in more detail later.
Although the exemplary network traffic management system 10 with the network traffic management apparatus 12, server devices 14(1)-14(n), client devices 16(1)-16(n), administrator device 18, and communication network(s) 20 are described and illustrated herein, other types and/or numbers of systems, devices, components, and/or elements in other topologies can be used. It is to be understood that the systems of the examples described herein are for exemplary purposes, as many variations of the specific hardware and software used to implement the examples are possible, as will be appreciated by those skilled in the relevant art(s).
One or more of the components depicted in the network traffic management system 10, such as the network traffic management apparatus 12, server devices 14(1)-14(n), client devices 16(1)-16(n), or administrator device 18, for example, may be configured to operate as virtual instances on the same physical machine. In other words, one or more of the network traffic management apparatus 12, server devices 14(1)-14(n), client devices 16(1)-16(n), or administrator device 18 may operate on the same physical device rather than as separate devices communicating through communication network(s). Additionally, there may be more or fewer network traffic management apparatus, client devices, server devices, or administrator devices than illustrated in
In addition, two or more computing systems or devices can be substituted for any one of the systems or devices in any example. Accordingly, principles and advantages of distributed processing, such as redundancy and replication also can be implemented, as desired, to increase the robustness and performance of the devices and systems of the examples. The examples may also be implemented on computer system(s) that extend across any suitable network using any suitable interface mechanisms and traffic technologies, including by way of example only teletraffic in any suitable form (e.g., voice and modem), wireless traffic networks, cellular traffic networks, Packet Data Networks (PDNs), the Internet, intranets, and combinations thereof.
The examples may also be embodied as one or more non-transitory computer readable media having instructions stored thereon for one or more aspects of the present technology as described and illustrated by way of the examples herein. The instructions in some examples include executable code that, when executed by one or more processors, cause the processors to carry out steps necessary to implement the methods of the examples of this technology that are described and illustrated herein.
An exemplary method of facilitating cipher selection will now be described with reference to
The attributes can include compatible browsers, FIPS compliance, FPS compliance, hardware acceleration support, an indication of strength or performance, and/or other compatibility information, for example, although other types and numbers of attributes can also be obtained in step 300. Optionally, a plurality of the cipher suites can be part of a default cipher suite set that is associated with a set of one or more attributes (e.g., FIPS compliance) that is shared by each of the plurality of cipher suites in the cipher suite set. Accordingly, the cipher database 32 includes a plurality of cipher suite sets and associated attributes for each of the cipher suite sets and/or one or more cipher suites within one or more of the cipher suite sets.
In step 302, the network traffic management apparatus 12 optionally determines whether creation of a new custom group or updating of a current custom group has been initiated. In one example, the network traffic management apparatus 12 can provide a GUI to the administrator device 18 that facilitates creation and updating of a custom group of cipher suites. If the network traffic management apparatus 12 determines that creation of a new custom group or updating of a current custom group has been initiated, then the Yes branch is taken to step 304.
In step 304, the network traffic management apparatus 12 obtains via the GUI an indication of a plurality of cipher suites to be included in a new custom group or one or more cipher suites to be added to a current custom group. In one example, a list of cipher suites can be provided via the GUI and based on the contents of the cipher database 32, and a user of the administrator device 18 can select cipher suites from the list for inclusion in a new or current custom group. Upon submission of the new or updated custom group by a user of the administrator device 18, the network traffic management apparatus 12 stores the new or updated custom group comprising the selected cipher suites in the cipher database 32 as a cipher suite set.
Subsequent to storing the new or updated custom group in the cipher database 32, or if the network traffic management apparatus 12 determines that creation of a new custom group or updating of a current custom group has not been initiated and the No branch is taken from step 302, the network traffic management apparatus 12 proceeds to step 306. In step 306, the network traffic management apparatus 12 obtains and applies custom selection rule(s) to the cipher database 32 to generate a result set of cipher suites.
In this example, the custom selection rules include set operation(s) such as addition, subtraction, and intersection, as well as an indication of one or more of the cipher suites, cipher suite sets, and/or attributes in the cipher database 32. Accordingly, the rules can allow, restrict, and/or exclude cipher suites, based on their inclusion in particular cipher suite sets and/or their associated attributers in the cipher database 32, in order to generate a result set. Optionally, the custom selection rules can be based on a security policy for an application hosted by one of the server devices 14(1)-14(n).
Referring more specifically to
Accordingly, in a first diagram 400, application of an allow or addition rule will generate a result set with all of the cipher suites in both cipher suite sets. In a second diagram 402, application of an intersection or restriction rule will generate a result set with only those cipher suites that are in both cipher suite sets. In a third diagram 404, application of a subtraction or exclude rule will generate a result set with all of the cipher suites in the FIPS cipher suite set except those cipher suites that are also in the Chrome v40 cipher suite set. In other examples, the selection rules can be applied to particular attributes instead of cipher suite sets, and other types and number of custom selection rules can also be used in other examples.
Referring back to
If the network traffic management apparatus 12 determines that a failure has occurred in the application of the custom selection rules, then the No branch is taken to step 310. In step 310, the network traffic management apparatus 12 optionally outputs an indication of the one of the custom selection rules that resulted in the failure. The indication can be output to the administrator device 18 via the GUI, for example, although other types of outputs and notification methods can also be used. Subsequent to outputting the indication, the network traffic management apparatus 12 proceeds back to step 306 and again obtains and applies custom selection rules from the administrator in order to address the failure.
Referring back to step 308, if the network traffic management apparatus 12 determines that a failure has not occurred, then the No branch is taken to step 312. In step 312, the network traffic management apparatus 12 obtains and applies custom priority rules to generate an ordered result set of cipher suites. The ordering of cipher suites in the result set, and generated cipher string, reflects a preference that is expressed during a negotiation of an SSL connection.
The custom priority rules can be obtained via a GUI provided to the administrator device 18, for example, and can include a recitation of cipher suite sets or attributes and their relative priorities. In one example, a custom priority rule might indicate that support for hardware acceleration is prioritized over FIPS compliance, which is prioritized over PFS compliance, for example. In this example, the network traffic management apparatus 12 applies the custom priority rules to the result set of cipher suites generated in step 306 based on the association in the cipher database 32 of the cipher suites of the result set with cipher suite sets or attributes identified in the custom priority rules. Other types and numbers of custom priority rules, and other methods for applying the custom priority rules, can also be used in other examples.
In step 314, the network traffic management apparatus 12 generates a cipher string based on the ordered result set generated in step 312. Accordingly, the cipher string is a text-based string that identifies cipher suite(s) resulting from the application of the custom selection and priority rules obtained and applied in steps 306 and 312, respectively.
In step 316, the network traffic management apparatus 12 outputs and/or stores the cipher string generated in step 314 in one of the SSL profiles. The cipher string can be output via a GUI provided to the administrator device 18, for example, which facilitates visibility, backward compatibility, and copy-paste functionality with respect to the cipher string. By storing the cipher string in one of the SSL profiles, the cipher string will be utilized when negotiating SSL connections on behalf of an associated application hosted by one of the server devices 14(1)-14(n).
Referring more specifically to
Referring back to
With this technology, custom selection and priority rules more effectively facilitate generation of cipher strings. In particular, the custom selection rules support multiple constraints simultaneously, as well as exclusion of certain sets of cipher suites sharing particular attributes. Accordingly, this technology allows administrators to establish SSL configurations with cipher strings in a more efficient manner with fewer errors, resulting in increased network security.
Having thus described the basic concept of the invention, it will be rather apparent to those skilled in the art that the foregoing detailed disclosure is intended to be presented by way of example only, and is not limiting. Various alterations, improvements, and modifications will occur and are intended to those skilled in the art, though not expressly stated herein. These alterations, improvements, and modifications are intended to be suggested hereby, and are within the spirit and scope of the invention. Additionally, the recited order of processing elements or sequences, or the use of numbers, letters, or other designations therefore, is not intended to limit the claimed processes to any order except as may be specified in the claims. Accordingly, the invention is limited only by the following claims and equivalents thereto.
This application claims the benefit of U.S. Provisional Patent Application Ser. No. 62/415,607 filed Nov. 1, 2016, which is hereby incorporated by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
3950735 | Patel | Apr 1976 | A |
4644532 | George et al. | Feb 1987 | A |
4897781 | Chang et al. | Jan 1990 | A |
4965772 | Daniel et al. | Oct 1990 | A |
5023826 | Patel | Jun 1991 | A |
5053953 | Patel | Oct 1991 | A |
5167024 | Smith et al. | Nov 1992 | A |
5282201 | Frank et al. | Jan 1994 | A |
5299312 | Rocco, Jr. | Mar 1994 | A |
5327529 | Fults et al. | Jul 1994 | A |
5367635 | Bauer et al. | Nov 1994 | A |
5371852 | Attanasio et al. | Dec 1994 | A |
5406502 | Haramaty et al. | Apr 1995 | A |
5475857 | Dally | Dec 1995 | A |
5517617 | Sathaye et al. | May 1996 | A |
5519694 | Brewer et al. | May 1996 | A |
5519778 | Leighton et al. | May 1996 | A |
5521591 | Arora et al. | May 1996 | A |
5528701 | Aref | Jun 1996 | A |
5550816 | Hardwick et al. | Aug 1996 | A |
5581764 | Fitzgerald et al. | Dec 1996 | A |
5596742 | Agarwal et al. | Jan 1997 | A |
5606665 | Yang et al. | Feb 1997 | A |
5611049 | Pitts | Mar 1997 | A |
5623490 | Richter et al. | Apr 1997 | A |
5663018 | Cummings et al. | Sep 1997 | A |
5752023 | Choucri et al. | May 1998 | A |
5761484 | Agarwal et al. | Jun 1998 | A |
5768423 | Aref et al. | Jun 1998 | A |
5774660 | Brendel et al. | Jun 1998 | A |
5790554 | Pitcher et al. | Aug 1998 | A |
5802052 | Venkataraman | Sep 1998 | A |
5812550 | Sohn et al. | Sep 1998 | A |
5825772 | Dobbins et al. | Oct 1998 | A |
5832283 | Chou et al. | Nov 1998 | A |
5858009 | Jonkman | Jan 1999 | A |
5875296 | Shi et al. | Feb 1999 | A |
5892914 | Pitts | Apr 1999 | A |
5892932 | Kim | Apr 1999 | A |
5919247 | Van Hoff et al. | Jul 1999 | A |
5936939 | Des Jardins et al. | Aug 1999 | A |
5941988 | Bhagwat et al. | Aug 1999 | A |
5946690 | Pitts | Aug 1999 | A |
5949885 | Leighton | Sep 1999 | A |
5951694 | Choquier et al. | Sep 1999 | A |
5959990 | Frantz et al. | Sep 1999 | A |
5974460 | Maddalozzo, Jr. et al. | Oct 1999 | A |
5983281 | Ogle et al. | Nov 1999 | A |
5988847 | McLaughlin et al. | Nov 1999 | A |
5991302 | Berl et al. | Nov 1999 | A |
5995491 | Richter et al. | Nov 1999 | A |
6006260 | Barrick, Jr. et al. | Dec 1999 | A |
6006264 | Colby et al. | Dec 1999 | A |
6026452 | Pitts | Feb 2000 | A |
6026500 | Topff et al. | Feb 2000 | A |
6028857 | Poor | Feb 2000 | A |
6029175 | Chow et al. | Feb 2000 | A |
6041365 | Kleinerman | Mar 2000 | A |
6047356 | Anderson et al. | Apr 2000 | A |
6051169 | Brown et al. | Apr 2000 | A |
6067558 | Wendt et al. | May 2000 | A |
6078956 | Bryant et al. | Jun 2000 | A |
6085234 | Pitts et al. | Jul 2000 | A |
6092196 | Reiche | Jul 2000 | A |
6104706 | Richter et al. | Aug 2000 | A |
6108703 | Leighton et al. | Aug 2000 | A |
6111876 | Frantz et al. | Aug 2000 | A |
6128279 | O'Neil et al. | Oct 2000 | A |
6128657 | Okanoya et al. | Oct 2000 | A |
6154777 | Ebrahim | Nov 2000 | A |
6157950 | Krishnan | Dec 2000 | A |
6160874 | Dickerman et al. | Dec 2000 | A |
6170022 | Linville et al. | Jan 2001 | B1 |
6178423 | Douceur et al. | Jan 2001 | B1 |
6182139 | Brendel | Jan 2001 | B1 |
6192051 | Lipman et al. | Feb 2001 | B1 |
6233612 | Fruchtman et al. | May 2001 | B1 |
6246684 | Chapman et al. | Jun 2001 | B1 |
6253226 | Chidambaran et al. | Jun 2001 | B1 |
6253230 | Couland et al. | Jun 2001 | B1 |
6259405 | Stewart et al. | Jul 2001 | B1 |
6260070 | Shah | Jul 2001 | B1 |
6263368 | Martin | Jul 2001 | B1 |
6289012 | Harrington et al. | Sep 2001 | B1 |
6292832 | Shah et al. | Sep 2001 | B1 |
6298380 | Coile et al. | Oct 2001 | B1 |
6304913 | Rune | Oct 2001 | B1 |
6327622 | Jindal et al. | Dec 2001 | B1 |
6330574 | Murashita | Dec 2001 | B1 |
6338082 | Schneider | Jan 2002 | B1 |
6343324 | Hubis et al. | Jan 2002 | B1 |
6347339 | Morris et al. | Feb 2002 | B1 |
6353848 | Morris | Mar 2002 | B1 |
6360270 | Cherkasova et al. | Mar 2002 | B1 |
6363056 | Beigi et al. | Mar 2002 | B1 |
6370527 | Singhal | Apr 2002 | B1 |
6374300 | Masters | Apr 2002 | B2 |
6389462 | Cohen et al. | May 2002 | B1 |
6389534 | Elgamal | May 2002 | B1 |
6396833 | Zhang et al. | May 2002 | B1 |
6430562 | Kardos et al. | Aug 2002 | B1 |
6434081 | Johnson et al. | Aug 2002 | B1 |
6446108 | Rosenberg et al. | Sep 2002 | B1 |
6466580 | Leung | Oct 2002 | B1 |
6469983 | Narayana et al. | Oct 2002 | B2 |
6480476 | Willars | Nov 2002 | B1 |
6484261 | Wiegel | Nov 2002 | B1 |
6490624 | Sampson et al. | Dec 2002 | B1 |
6510135 | Almulhem et al. | Jan 2003 | B1 |
6510458 | Berstis et al. | Jan 2003 | B1 |
6513061 | Ebata et al. | Jan 2003 | B1 |
6514085 | Slattery et al. | Feb 2003 | B2 |
6519643 | Foulkes et al. | Feb 2003 | B1 |
6542936 | Mayle et al. | Apr 2003 | B1 |
6560230 | Li et al. | May 2003 | B1 |
6578069 | Hopmann et al. | Jun 2003 | B1 |
6601084 | Bhaskaran et al. | Jul 2003 | B1 |
6615267 | Whalen et al. | Sep 2003 | B1 |
6631422 | Althaus et al. | Oct 2003 | B1 |
6636503 | Shiran et al. | Oct 2003 | B1 |
6636894 | Short et al. | Oct 2003 | B1 |
6650640 | Muller et al. | Nov 2003 | B1 |
6650641 | Albert et al. | Nov 2003 | B1 |
6654346 | Mahalingaiah et al. | Nov 2003 | B1 |
6654701 | Hatley | Nov 2003 | B2 |
6683873 | Kwok et al. | Jan 2004 | B1 |
6691165 | Bruck et al. | Feb 2004 | B1 |
6694517 | James et al. | Feb 2004 | B1 |
6701415 | Hendren, III | Mar 2004 | B1 |
6708187 | Shanumgam et al. | Mar 2004 | B1 |
6708220 | Olin | Mar 2004 | B1 |
6711264 | Matsumoto | Mar 2004 | B1 |
6711677 | Wiegley | Mar 2004 | B1 |
6718380 | Mohaban et al. | Apr 2004 | B1 |
6728704 | Mao et al. | Apr 2004 | B2 |
6738357 | Richter et al. | May 2004 | B1 |
6742045 | Albert et al. | May 2004 | B1 |
6744776 | Kalkunte et al. | Jun 2004 | B1 |
6751663 | Farrell et al. | Jun 2004 | B1 |
6754215 | Arikawa et al. | Jun 2004 | B1 |
6754228 | Ludwig | Jun 2004 | B1 |
6754699 | Swildens et al. | Jun 2004 | B2 |
6760337 | Snyder, II et al. | Jul 2004 | B1 |
6760775 | Anerousis et al. | Jul 2004 | B1 |
6772219 | Shobatake | Aug 2004 | B1 |
6779039 | Bommareddy et al. | Aug 2004 | B1 |
6781986 | Sabaa et al. | Aug 2004 | B1 |
6795860 | Shah | Sep 2004 | B1 |
6798777 | Ferguson et al. | Sep 2004 | B1 |
6816901 | Sitaraman et al. | Nov 2004 | B1 |
6816977 | Brakmo et al. | Nov 2004 | B2 |
6804542 | Haartsen | Dec 2004 | B1 |
6829238 | Tokuyo et al. | Dec 2004 | B2 |
6862282 | Oden | Mar 2005 | B1 |
6865593 | Reshef et al. | Mar 2005 | B1 |
6868082 | Allen, Jr. et al. | Mar 2005 | B1 |
6868447 | Slaughter et al. | Mar 2005 | B1 |
6871221 | Styles | Mar 2005 | B1 |
6876629 | Beshai et al. | Apr 2005 | B2 |
6876654 | Hegde | Apr 2005 | B1 |
6880017 | Marce et al. | Apr 2005 | B1 |
6883137 | Girardot et al. | Apr 2005 | B1 |
6886102 | Lyle | Apr 2005 | B1 |
6888836 | Cherkasova | May 2005 | B1 |
6895504 | Zhang | May 2005 | B1 |
6904040 | Salapura et al. | Jun 2005 | B2 |
6914881 | Mansfield et al. | Jul 2005 | B1 |
6928082 | Liu et al. | Aug 2005 | B2 |
6929518 | Talagala | Aug 2005 | B1 |
6947985 | Hegli et al. | Sep 2005 | B2 |
6950434 | Viswanath et al. | Sep 2005 | B1 |
6954780 | Susai et al. | Oct 2005 | B2 |
6957272 | Tallegas et al. | Oct 2005 | B2 |
6959394 | Brickell et al. | Oct 2005 | B1 |
6970475 | Fraser et al. | Nov 2005 | B1 |
6970924 | Chu et al. | Nov 2005 | B1 |
6971028 | Lyle | Nov 2005 | B1 |
6973490 | Robertson et al. | Dec 2005 | B1 |
6975592 | Seddigh et al. | Dec 2005 | B1 |
6987763 | Rochberger et al. | Jan 2006 | B2 |
6990074 | Wan et al. | Jan 2006 | B2 |
6990114 | Erimli et al. | Jan 2006 | B1 |
7003564 | Greuel et al. | Feb 2006 | B2 |
7006502 | Lin | Feb 2006 | B2 |
7007092 | Peiffer | Feb 2006 | B2 |
7020713 | Shah et al. | Mar 2006 | B1 |
7023974 | Brannam et al. | Apr 2006 | B1 |
7035212 | Mittal et al. | Apr 2006 | B1 |
7039061 | Connor et al. | May 2006 | B2 |
7065482 | Shorey et al. | Jun 2006 | B2 |
7075924 | Richter et al. | Jul 2006 | B2 |
7076689 | Atkinson | Jul 2006 | B2 |
7080314 | Garofalakis et al. | Jul 2006 | B1 |
7089491 | Feinberg et al. | Aug 2006 | B2 |
7113993 | Capiello et al. | Sep 2006 | B1 |
7113996 | Kronenberg | Sep 2006 | B2 |
7121460 | Parsons | Oct 2006 | B1 |
7133863 | Teng et al. | Nov 2006 | B2 |
7133944 | Song et al. | Nov 2006 | B2 |
7139792 | Mishra et al. | Nov 2006 | B1 |
7161904 | Hussain et al. | Jan 2007 | B2 |
7191163 | Herrara et al. | Mar 2007 | B2 |
7200234 | Bousis | Apr 2007 | B2 |
7206932 | Kirchhoff | Apr 2007 | B1 |
7219223 | Bacchus | May 2007 | B1 |
7228359 | Monteiro | Jun 2007 | B1 |
7228422 | Morioka et al. | Jun 2007 | B2 |
7229009 | Parsons | Jun 2007 | B1 |
7236491 | Tsao et al. | Jun 2007 | B2 |
7240100 | Wein et al. | Jul 2007 | B1 |
7257633 | Masputra et al. | Aug 2007 | B2 |
7287082 | O'Toole, Jr. | Oct 2007 | B1 |
7292541 | Cs | Nov 2007 | B1 |
7295827 | Liu et al. | Nov 2007 | B2 |
7296263 | Jacob | Nov 2007 | B1 |
7308475 | Pruitt et al. | Dec 2007 | B1 |
7308703 | Wright et al. | Dec 2007 | B2 |
7309004 | Muschellack et al. | Dec 2007 | B1 |
7321926 | Zhang et al. | Jan 2008 | B1 |
7324533 | DeLiberato et al. | Jan 2008 | B1 |
7331038 | Snodgrass | Feb 2008 | B1 |
7333999 | Njemanze | Feb 2008 | B1 |
7340571 | Saze | Mar 2008 | B2 |
7343413 | Gilde et al. | Mar 2008 | B2 |
7349391 | Ben-Dor et al. | Mar 2008 | B2 |
7373438 | DeBergalis et al. | May 2008 | B1 |
7398552 | Pardee et al. | Jul 2008 | B2 |
7409440 | Jacob | Aug 2008 | B1 |
7417990 | Ikeda et al. | Aug 2008 | B2 |
7433962 | Janssen et al. | Oct 2008 | B2 |
7454480 | Labio et al. | Nov 2008 | B2 |
7487353 | Pryor et al. | Feb 2009 | B2 |
7490162 | Masters | Feb 2009 | B1 |
7500243 | Huetsch et al. | Mar 2009 | B2 |
7500269 | Huotari et al. | Mar 2009 | B2 |
7505795 | Lim et al. | Mar 2009 | B1 |
7516492 | Nisbet et al. | Apr 2009 | B1 |
7526541 | Roese et al. | Apr 2009 | B2 |
7555608 | Naik et al. | Jun 2009 | B2 |
7558197 | Sindhu et al. | Jul 2009 | B1 |
7577723 | Matsuda et al. | Aug 2009 | B2 |
7580971 | Gollapudi et al. | Aug 2009 | B1 |
7624424 | Morita et al. | Nov 2009 | B2 |
7640235 | Shulman et al. | Dec 2009 | B2 |
7640347 | Sloat et al. | Dec 2009 | B1 |
7644137 | Bozak et al. | Jan 2010 | B2 |
7668166 | Rekhter et al. | Feb 2010 | B1 |
7684423 | Tripathi et al. | Mar 2010 | B2 |
7698458 | Lui et al. | Apr 2010 | B1 |
7721951 | Parsons et al. | May 2010 | B1 |
7724657 | Rao et al. | May 2010 | B2 |
7725093 | Sengupta et al. | May 2010 | B2 |
7733859 | Takahashi | Jun 2010 | B2 |
7743420 | Shulman et al. | Jun 2010 | B2 |
7752662 | Shulman et al. | Jul 2010 | B2 |
7778187 | Chaturvedi et al. | Aug 2010 | B2 |
7801978 | Susai et al. | Sep 2010 | B1 |
7822839 | Pruitt et al. | Oct 2010 | B1 |
7831662 | Clark et al. | Nov 2010 | B2 |
7861085 | Case et al. | Dec 2010 | B1 |
7877511 | Berger et al. | Jan 2011 | B1 |
7881446 | Apple | Feb 2011 | B1 |
7895653 | Calo et al. | Feb 2011 | B2 |
7903554 | Manur et al. | Mar 2011 | B1 |
7908245 | Nakano et al. | Mar 2011 | B2 |
7908314 | Yamaguchi et al. | Mar 2011 | B2 |
7925908 | Kim | Apr 2011 | B2 |
7933946 | Livshits et al. | Apr 2011 | B2 |
7945908 | Waldspurger et al. | May 2011 | B1 |
7958222 | Pruitt et al. | Jun 2011 | B1 |
7984141 | Gupta et al. | Jul 2011 | B2 |
7984500 | Khanna et al. | Jul 2011 | B1 |
7988039 | Muschellack | Aug 2011 | B1 |
8015595 | Benbrahim | Sep 2011 | B2 |
8024443 | Jacob | Sep 2011 | B1 |
8031849 | Apple | Oct 2011 | B1 |
8037528 | Williams et al. | Oct 2011 | B2 |
8046504 | Feinberg | Oct 2011 | B2 |
8064342 | Badger | Nov 2011 | B2 |
8064580 | Apple | Nov 2011 | B1 |
8069225 | McCann et al. | Nov 2011 | B2 |
8081958 | Soderstrom | Dec 2011 | B2 |
8117244 | Marinov et al. | Feb 2012 | B2 |
8130650 | Allen, Jr. et al. | Mar 2012 | B2 |
8154999 | Tsuge | Apr 2012 | B2 |
8155128 | Balyan et al. | Apr 2012 | B2 |
8171124 | Kondamuru | May 2012 | B2 |
8180747 | Marinkovic et al. | May 2012 | B2 |
8190769 | Shukla et al. | May 2012 | B1 |
8199757 | Pani et al. | Jun 2012 | B2 |
8261087 | Fort | Sep 2012 | B2 |
8271620 | Witchey | Sep 2012 | B2 |
8276140 | Beda et al. | Sep 2012 | B1 |
8295446 | Apple | Oct 2012 | B1 |
8351333 | Rao et al. | Jan 2013 | B2 |
8380854 | Szabo | Feb 2013 | B2 |
8396836 | Ferguson et al. | Mar 2013 | B1 |
8447871 | Szabo | May 2013 | B1 |
8463850 | McCann | Jun 2013 | B1 |
8464265 | Worley | Jun 2013 | B2 |
8484348 | Subramanian et al. | Jul 2013 | B2 |
8560693 | Wang et al. | Oct 2013 | B1 |
8601000 | Stefani et al. | Dec 2013 | B1 |
8606234 | Pei | Dec 2013 | B2 |
8606921 | Vasquez et al. | Dec 2013 | B2 |
8615022 | Harrison et al. | Dec 2013 | B2 |
8665868 | Kay | Mar 2014 | B2 |
8701179 | Penno et al. | Apr 2014 | B1 |
8788665 | Glide et al. | Jul 2014 | B2 |
8804504 | Chen | Aug 2014 | B1 |
8830874 | Cho et al. | Sep 2014 | B2 |
8838817 | Biswas | Sep 2014 | B1 |
8879431 | Ridel et al. | Nov 2014 | B2 |
8959215 | Koponen et al. | Feb 2015 | B2 |
9143451 | Amdahl et al. | Sep 2015 | B2 |
9390291 | Cox | Jul 2016 | B2 |
9479480 | Ovsiannikov | Oct 2016 | B2 |
9893883 | Chaubey | Feb 2018 | B1 |
9923923 | Sharifi Mehr | Mar 2018 | B1 |
9935769 | Mehr | Apr 2018 | B1 |
10171495 | Bowen | Jan 2019 | B1 |
10374800 | Sharifi Mehr | Aug 2019 | B1 |
10567434 | Sharifi Mehr | Feb 2020 | B1 |
20010007560 | Masuda et al. | Jul 2001 | A1 |
20010023442 | Masters | Sep 2001 | A1 |
20020004784 | Forbes | Jan 2002 | A1 |
20020010757 | Granik et al. | Jan 2002 | A1 |
20020012352 | Hansson et al. | Jan 2002 | A1 |
20020032855 | Neves | Mar 2002 | A1 |
20020038360 | Andrews et al. | Mar 2002 | A1 |
20020040400 | Masters | Apr 2002 | A1 |
20020049842 | Huetsch et al. | Apr 2002 | A1 |
20020059428 | Susai et al. | May 2002 | A1 |
20020065848 | Walker et al. | May 2002 | A1 |
20020065922 | Shastri | May 2002 | A1 |
20020072048 | Slattery et al. | Jun 2002 | A1 |
20020083067 | Tamayo et al. | Jun 2002 | A1 |
20020085710 | Ananth | Jul 2002 | A1 |
20020087571 | Stapel et al. | Jul 2002 | A1 |
20020087744 | Kitchin | Jul 2002 | A1 |
20020099829 | Richards et al. | Jul 2002 | A1 |
20020099842 | Jennings et al. | Jul 2002 | A1 |
20020103823 | Jackson et al. | Aug 2002 | A1 |
20020128908 | Levin | Sep 2002 | A1 |
20020138615 | Schmeling | Sep 2002 | A1 |
20020143819 | Han et al. | Oct 2002 | A1 |
20020143852 | Guo et al. | Oct 2002 | A1 |
20020161913 | Gonzalez et al. | Oct 2002 | A1 |
20020162118 | Levy et al. | Oct 2002 | A1 |
20020174216 | Shorey et al. | Nov 2002 | A1 |
20020194112 | dePinto et al. | Dec 2002 | A1 |
20020194342 | Lu et al. | Dec 2002 | A1 |
20020198956 | Dunshea et al. | Dec 2002 | A1 |
20020198993 | Cudd et al. | Dec 2002 | A1 |
20030005172 | Chessell | Jan 2003 | A1 |
20030009528 | Sharif et al. | Jan 2003 | A1 |
20030018450 | Carley | Jan 2003 | A1 |
20030018585 | Butler et al. | Jan 2003 | A1 |
20030034905 | Anton et al. | Feb 2003 | A1 |
20030046291 | Fascenda | Mar 2003 | A1 |
20030051045 | Connor | Mar 2003 | A1 |
20030053632 | Bousis | Mar 2003 | A1 |
20030055723 | English | Mar 2003 | A1 |
20030065951 | Igeta et al. | Apr 2003 | A1 |
20030069918 | Lu et al. | Apr 2003 | A1 |
20030069974 | Lu et al. | Apr 2003 | A1 |
20030070069 | Belapurkar et al. | Apr 2003 | A1 |
20030074301 | Solomon | Apr 2003 | A1 |
20030086415 | Bernhard et al. | May 2003 | A1 |
20030105846 | Zhao et al. | Jun 2003 | A1 |
20030105983 | Brakmo et al. | Jun 2003 | A1 |
20030108000 | Chaney et al. | Jun 2003 | A1 |
20030108002 | Chaney et al. | Jun 2003 | A1 |
20030108052 | Inoue et al. | Jun 2003 | A1 |
20030128708 | Inoue et al. | Jul 2003 | A1 |
20030130945 | Force et al. | Jul 2003 | A1 |
20030131115 | Mi | Jul 2003 | A1 |
20030139934 | Mandera | Jul 2003 | A1 |
20030145062 | Sharma et al. | Jul 2003 | A1 |
20030145233 | Poletto et al. | Jul 2003 | A1 |
20030156586 | Lee et al. | Aug 2003 | A1 |
20030163576 | Janssen et al. | Aug 2003 | A1 |
20030179755 | Fraser | Sep 2003 | A1 |
20030187805 | Shen | Oct 2003 | A1 |
20030189936 | Terrell et al. | Oct 2003 | A1 |
20030191812 | Agarwalla et al. | Oct 2003 | A1 |
20030195813 | Pallister et al. | Oct 2003 | A1 |
20030195962 | Kikuchi et al. | Oct 2003 | A1 |
20030212954 | Patrudu | Nov 2003 | A1 |
20030220835 | Barnes, Jr. | Nov 2003 | A1 |
20030225485 | Fritz et al. | Dec 2003 | A1 |
20030229665 | Ryman | Dec 2003 | A1 |
20030236995 | Fretwell, Jr. | Dec 2003 | A1 |
20040003287 | Zissimopoulos et al. | Jan 2004 | A1 |
20040006591 | Matsui et al. | Jan 2004 | A1 |
20040015783 | Lennon et al. | Jan 2004 | A1 |
20040017825 | Stanwood et al. | Jan 2004 | A1 |
20040017913 | Hawkes | Jan 2004 | A1 |
20040030627 | Sedukhin | Feb 2004 | A1 |
20040030740 | Stelting | Feb 2004 | A1 |
20040039924 | Baldwin | Feb 2004 | A1 |
20040043758 | Sorvari et al. | Mar 2004 | A1 |
20040059789 | Shum | Mar 2004 | A1 |
20040064544 | Barsness et al. | Apr 2004 | A1 |
20040064554 | Kuno et al. | Apr 2004 | A1 |
20040072569 | Omae et al. | Apr 2004 | A1 |
20040073792 | Noble | Apr 2004 | A1 |
20040093361 | Therrien et al. | May 2004 | A1 |
20040096055 | Williams | May 2004 | A1 |
20040103283 | Hornak | May 2004 | A1 |
20040111523 | Hall et al. | Jun 2004 | A1 |
20040111621 | Himberger et al. | Jun 2004 | A1 |
20040117493 | Bazot et al. | Jun 2004 | A1 |
20040122926 | Moore et al. | Jun 2004 | A1 |
20040123277 | Schrader et al. | Jun 2004 | A1 |
20040133605 | Chang et al. | Jul 2004 | A1 |
20040138858 | Carley | Jul 2004 | A1 |
20040151186 | Akama | Aug 2004 | A1 |
20040167967 | Bastian et al. | Aug 2004 | A1 |
20040177165 | Masputra et al. | Sep 2004 | A1 |
20040187036 | Nakamura | Sep 2004 | A1 |
20040192312 | Li et al. | Sep 2004 | A1 |
20040213156 | Smallwood et al. | Oct 2004 | A1 |
20040215665 | Edgar et al. | Oct 2004 | A1 |
20040236826 | Harville et al. | Nov 2004 | A1 |
20040264472 | Oliver et al. | Dec 2004 | A1 |
20040264481 | Darling et al. | Dec 2004 | A1 |
20040267920 | Hydrie et al. | Dec 2004 | A1 |
20040267948 | Oliver et al. | Dec 2004 | A1 |
20040268358 | Darling et al. | Dec 2004 | A1 |
20050004887 | Igakura et al. | Jan 2005 | A1 |
20050008017 | Datta et al. | Jan 2005 | A1 |
20050021703 | Cherry et al. | Jan 2005 | A1 |
20050021736 | Carusi et al. | Jan 2005 | A1 |
20050027841 | Rolfe | Feb 2005 | A1 |
20050027869 | Johnson | Feb 2005 | A1 |
20050044158 | Malik | Feb 2005 | A1 |
20050044213 | Kobayashi et al. | Feb 2005 | A1 |
20050052440 | Kim et al. | Mar 2005 | A1 |
20050055435 | Gbadegesin et al. | Mar 2005 | A1 |
20050060590 | Bradley et al. | Mar 2005 | A1 |
20050078604 | Yim | Apr 2005 | A1 |
20050117589 | Douady et al. | Jun 2005 | A1 |
20050122977 | Lieberman | Jun 2005 | A1 |
20050137983 | Bells | Jun 2005 | A1 |
20050149459 | Kofman | Jul 2005 | A1 |
20050154837 | Keohane et al. | Jul 2005 | A1 |
20050165656 | Frederick et al. | Jul 2005 | A1 |
20050174944 | Legault et al. | Aug 2005 | A1 |
20050175013 | Le Pennec et al. | Aug 2005 | A1 |
20050187866 | Lee | Aug 2005 | A1 |
20050188220 | Nilsson et al. | Aug 2005 | A1 |
20050198234 | Leib et al. | Sep 2005 | A1 |
20050198310 | Kim et al. | Sep 2005 | A1 |
20050198501 | Andreev | Sep 2005 | A1 |
20050213587 | Cho et al. | Sep 2005 | A1 |
20050234928 | Shkvarchuk et al. | Oct 2005 | A1 |
20050240664 | Chen et al. | Oct 2005 | A1 |
20050251802 | Bozek et al. | Nov 2005 | A1 |
20050256806 | Tien et al. | Nov 2005 | A1 |
20050262238 | Reeves et al. | Nov 2005 | A1 |
20060013229 | Johansson | Jan 2006 | A1 |
20060031374 | Lu et al. | Feb 2006 | A1 |
20060031520 | Bedekar et al. | Feb 2006 | A1 |
20060031778 | Goodwin et al. | Feb 2006 | A1 |
20060045089 | Bacher et al. | Mar 2006 | A1 |
20060045096 | Farmer et al. | Mar 2006 | A1 |
20060047785 | Wang et al. | Mar 2006 | A1 |
20060059267 | Cugi et al. | Mar 2006 | A1 |
20060072572 | Ikeda | Apr 2006 | A1 |
20060077902 | Kannan et al. | Apr 2006 | A1 |
20060100752 | Kim et al. | May 2006 | A1 |
20060112176 | Liu et al. | May 2006 | A1 |
20060112272 | Morioka et al. | May 2006 | A1 |
20060112367 | Harris | May 2006 | A1 |
20060123210 | Pritchett et al. | Jun 2006 | A1 |
20060129684 | Datta | Jun 2006 | A1 |
20060130133 | Andreev et al. | Jun 2006 | A1 |
20060133374 | Sekiguchi | Jun 2006 | A1 |
20060135198 | Lee | Jun 2006 | A1 |
20060140193 | Kakani et al. | Jun 2006 | A1 |
20060153201 | Hepper et al. | Jul 2006 | A1 |
20060156416 | Huotari et al. | Jul 2006 | A1 |
20060161577 | Kulkami et al. | Jul 2006 | A1 |
20060171365 | Borella | Aug 2006 | A1 |
20060209669 | Nishio | Sep 2006 | A1 |
20060209853 | Hidaka et al. | Sep 2006 | A1 |
20060229861 | Tatsuoka et al. | Oct 2006 | A1 |
20060230148 | Forecast et al. | Oct 2006 | A1 |
20060233106 | Achlioptas et al. | Oct 2006 | A1 |
20060235998 | Stecher et al. | Oct 2006 | A1 |
20060242300 | Yumoto et al. | Oct 2006 | A1 |
20060259320 | LaSalle et al. | Nov 2006 | A1 |
20060264201 | Zhang | Nov 2006 | A1 |
20060265484 | Delia | Nov 2006 | A1 |
20060268692 | Wright et al. | Nov 2006 | A1 |
20060270341 | Kim et al. | Nov 2006 | A1 |
20060272008 | Shulman et al. | Nov 2006 | A1 |
20060282442 | Lennon et al. | Dec 2006 | A1 |
20060282529 | Nordin | Dec 2006 | A1 |
20060282545 | Arwe | Dec 2006 | A1 |
20060288213 | Gasparini | Dec 2006 | A1 |
20070005807 | Wong | Jan 2007 | A1 |
20070006293 | Balakrishnan et al. | Jan 2007 | A1 |
20070016613 | Foresti et al. | Jan 2007 | A1 |
20070016662 | Desai et al. | Jan 2007 | A1 |
20070019636 | Lau et al. | Jan 2007 | A1 |
20070038994 | Davis et al. | Feb 2007 | A1 |
20070058670 | Konduru et al. | Mar 2007 | A1 |
20070064661 | Sood et al. | Mar 2007 | A1 |
20070067771 | Kulbak et al. | Mar 2007 | A1 |
20070083646 | Miller et al. | Apr 2007 | A1 |
20070088822 | Coile et al. | Apr 2007 | A1 |
20070106796 | Kudo et al. | May 2007 | A1 |
20070107048 | Halls et al. | May 2007 | A1 |
20070112775 | Ackerman | May 2007 | A1 |
20070113269 | Zhang | May 2007 | A1 |
20070118879 | Yeun | May 2007 | A1 |
20070124415 | Lev-Ran et al. | May 2007 | A1 |
20070124477 | Martin | May 2007 | A1 |
20070124502 | Li | May 2007 | A1 |
20070124806 | Shulman et al. | May 2007 | A1 |
20070130255 | Wolovitz et al. | Jun 2007 | A1 |
20070147246 | Hurley et al. | Jun 2007 | A1 |
20070150603 | Crull | Jun 2007 | A1 |
20070162891 | Burner et al. | Jul 2007 | A1 |
20070168320 | Borthakur et al. | Jul 2007 | A1 |
20070168525 | DeLeon et al. | Jul 2007 | A1 |
20070174491 | Still et al. | Jul 2007 | A1 |
20070192543 | Naik et al. | Aug 2007 | A1 |
20070214503 | Shulman et al. | Sep 2007 | A1 |
20070220598 | Salowey et al. | Sep 2007 | A1 |
20070233809 | Brownell et al. | Oct 2007 | A1 |
20070233826 | Tindal et al. | Oct 2007 | A1 |
20070250560 | Wein et al. | Oct 2007 | A1 |
20070274290 | Takahashi et al. | Nov 2007 | A1 |
20070294539 | Shulman et al. | Dec 2007 | A1 |
20070297410 | Yoon et al. | Dec 2007 | A1 |
20070297551 | Choi | Dec 2007 | A1 |
20080004022 | Johannesson et al. | Jan 2008 | A1 |
20080010372 | Khedouri et al. | Jan 2008 | A1 |
20080022059 | Zimmerer et al. | Jan 2008 | A1 |
20080025297 | Kashyap | Jan 2008 | A1 |
20080034136 | Ulenas | Feb 2008 | A1 |
20080034442 | Nonaka et al. | Feb 2008 | A1 |
20080034443 | Nonaka et al. | Feb 2008 | A1 |
20080049627 | Nordin | Feb 2008 | A1 |
20080072303 | Syed | Mar 2008 | A1 |
20080120370 | Chan et al. | May 2008 | A1 |
20080120592 | Tanguay et al. | May 2008 | A1 |
20080132215 | Soderstrom et al. | Jun 2008 | A1 |
20080133518 | Kapoor et al. | Jun 2008 | A1 |
20080134311 | Medvinsky et al. | Jun 2008 | A1 |
20080141246 | Kuck et al. | Jun 2008 | A1 |
20080148340 | Powell et al. | Jun 2008 | A1 |
20080159145 | Muthukrishnan et al. | Jul 2008 | A1 |
20080175393 | Oba et al. | Jul 2008 | A1 |
20080178277 | Oba et al. | Jul 2008 | A1 |
20080178278 | Grinstein et al. | Jul 2008 | A1 |
20080201599 | Ferraiolo et al. | Aug 2008 | A1 |
20080205613 | Lopez | Aug 2008 | A1 |
20080208917 | Smoot et al. | Aug 2008 | A1 |
20080209205 | Rowley | Aug 2008 | A1 |
20080212783 | Oba | Sep 2008 | A1 |
20080222646 | Sigal et al. | Sep 2008 | A1 |
20080225710 | Raja et al. | Sep 2008 | A1 |
20080229415 | Kapoor et al. | Sep 2008 | A1 |
20080253395 | Pandya | Oct 2008 | A1 |
20080256224 | Kaji et al. | Oct 2008 | A1 |
20080263401 | Stenzel | Oct 2008 | A1 |
20080270564 | Rangegowda et al. | Oct 2008 | A1 |
20080270578 | Zhang et al. | Oct 2008 | A1 |
20080281908 | McCann et al. | Nov 2008 | A1 |
20080281944 | Vorne et al. | Nov 2008 | A1 |
20080288661 | Gailes | Nov 2008 | A1 |
20080301760 | Lim | Dec 2008 | A1 |
20080320307 | Zhang et al. | Dec 2008 | A1 |
20090024853 | Yeap et al. | Jan 2009 | A1 |
20090028337 | Balabine et al. | Jan 2009 | A1 |
20090037995 | Zapata | Feb 2009 | A1 |
20090049230 | Pandya | Feb 2009 | A1 |
20090049438 | Draper et al. | Feb 2009 | A1 |
20090052671 | Bauchot et al. | Feb 2009 | A1 |
20090070617 | Arimilli et al. | Mar 2009 | A1 |
20090077618 | Pearce | Mar 2009 | A1 |
20090077619 | Boyce | Mar 2009 | A1 |
20090080440 | Balyan et al. | Mar 2009 | A1 |
20090089487 | Kwon et al. | Apr 2009 | A1 |
20090094311 | Awadallah et al. | Apr 2009 | A1 |
20090094610 | Sukirya | Apr 2009 | A1 |
20090097480 | Curtis et al. | Apr 2009 | A1 |
20090106409 | Murata | Apr 2009 | A1 |
20090106413 | Salo et al. | Apr 2009 | A1 |
20090119504 | Van Os et al. | May 2009 | A1 |
20090125496 | Wexler et al. | May 2009 | A1 |
20090125532 | Wexler et al. | May 2009 | A1 |
20090125625 | Shim et al. | May 2009 | A1 |
20090125955 | DeLorme | May 2009 | A1 |
20090131053 | Sachs et al. | May 2009 | A1 |
20090138314 | Bruce | May 2009 | A1 |
20090138749 | Moll et al. | May 2009 | A1 |
20090141891 | Boyen et al. | Jun 2009 | A1 |
20090157678 | Turk | Jun 2009 | A1 |
20090157882 | Kashyap | Jun 2009 | A1 |
20090161542 | Ho | Jun 2009 | A1 |
20090177698 | Chan et al. | Jul 2009 | A1 |
20090187915 | Chew et al. | Jul 2009 | A1 |
20090196282 | Fellman et al. | Aug 2009 | A1 |
20090198820 | Golla et al. | Aug 2009 | A1 |
20090217163 | Jaroker | Aug 2009 | A1 |
20090217386 | Schneider | Aug 2009 | A1 |
20090228956 | He et al. | Sep 2009 | A1 |
20090241176 | Beletski et al. | Sep 2009 | A1 |
20090248858 | Sivasubramanian | Oct 2009 | A1 |
20090265396 | Ram et al. | Oct 2009 | A1 |
20090265467 | Peles | Oct 2009 | A1 |
20090285118 | Yoshikawa et al. | Nov 2009 | A1 |
20090287935 | Aull et al. | Nov 2009 | A1 |
20090288143 | Stebila et al. | Nov 2009 | A1 |
20090289828 | Hinchey | Nov 2009 | A1 |
20090292957 | Bower et al. | Nov 2009 | A1 |
20090296624 | Ryu et al. | Dec 2009 | A1 |
20090300161 | Pruitt et al. | Dec 2009 | A1 |
20090300407 | Kamath et al. | Dec 2009 | A1 |
20090316708 | Yahyaoui et al. | Dec 2009 | A1 |
20090319600 | Sedan et al. | Dec 2009 | A1 |
20100009554 | Ryu et al. | Jan 2010 | A1 |
20100011434 | Kay | Jan 2010 | A1 |
20100017846 | Huang et al. | Jan 2010 | A1 |
20100017874 | Piccinini et al. | Jan 2010 | A1 |
20100023582 | Pedersen et al. | Jan 2010 | A1 |
20100042743 | Jeon et al. | Feb 2010 | A1 |
20100042869 | Szabo et al. | Feb 2010 | A1 |
20100058054 | Irvine | Mar 2010 | A1 |
20100061232 | Zhou et al. | Mar 2010 | A1 |
20100064001 | Daily | Mar 2010 | A1 |
20100070476 | O'Keefe et al. | Mar 2010 | A1 |
20100071048 | Novak et al. | Mar 2010 | A1 |
20100088752 | Nagulakonda et al. | Apr 2010 | A1 |
20100093318 | Zhu et al. | Apr 2010 | A1 |
20100103837 | Jungck et al. | Apr 2010 | A1 |
20100115236 | Bataineh et al. | May 2010 | A1 |
20100122091 | Huang et al. | May 2010 | A1 |
20100131654 | Malakapalli et al. | May 2010 | A1 |
20100134818 | Minamizono et al. | Jun 2010 | A1 |
20100146085 | Van Wie et al. | Jun 2010 | A1 |
20100150154 | Viger et al. | Jun 2010 | A1 |
20100154066 | Hammes et al. | Jun 2010 | A1 |
20100165877 | Shukla et al. | Jul 2010 | A1 |
20100179984 | Sebastian | Jul 2010 | A1 |
20100183150 | Lee | Jul 2010 | A1 |
20100199104 | Van Rijnswou | Aug 2010 | A1 |
20100228814 | McKenna et al. | Sep 2010 | A1 |
20100228819 | Wei | Sep 2010 | A1 |
20100242092 | Harris et al. | Sep 2010 | A1 |
20100250497 | Redlich et al. | Sep 2010 | A1 |
20100251330 | Kroeselberg et al. | Sep 2010 | A1 |
20100274772 | Samuels | Oct 2010 | A1 |
20100278733 | Karsten et al. | Nov 2010 | A1 |
20100287548 | Zhou et al. | Nov 2010 | A1 |
20100306169 | Pishevar et al. | Dec 2010 | A1 |
20100322250 | Shelly et al. | Dec 2010 | A1 |
20100323715 | Winters | Dec 2010 | A1 |
20100325277 | Muthiah et al. | Dec 2010 | A1 |
20110029581 | Zhao | Feb 2011 | A1 |
20110040889 | Garrett et al. | Feb 2011 | A1 |
20110047620 | Mahaffey et al. | Feb 2011 | A1 |
20110055921 | Narayanaswamy et al. | Mar 2011 | A1 |
20110066718 | Susai et al. | Mar 2011 | A1 |
20110066736 | Mitchell et al. | Mar 2011 | A1 |
20110072321 | Dhuse | Mar 2011 | A1 |
20110075667 | Li et al. | Mar 2011 | A1 |
20110078303 | Li et al. | Mar 2011 | A1 |
20110098087 | Tseng | Apr 2011 | A1 |
20110113095 | Hatami-Hanza | May 2011 | A1 |
20110153822 | Rajan et al. | Jun 2011 | A1 |
20110154443 | Thakur et al. | Jun 2011 | A1 |
20110167263 | Cross | Jul 2011 | A1 |
20110173295 | Bakke et al. | Jul 2011 | A1 |
20110184733 | Yu et al. | Jul 2011 | A1 |
20110185082 | Thompson | Jul 2011 | A1 |
20110188415 | Graziano | Aug 2011 | A1 |
20110213911 | Eldus et al. | Sep 2011 | A1 |
20110246651 | Djabarov | Oct 2011 | A1 |
20110246800 | Accpadi et al. | Oct 2011 | A1 |
20110273984 | Hsu et al. | Nov 2011 | A1 |
20110282997 | Prince et al. | Nov 2011 | A1 |
20110295996 | Qiu | Dec 2011 | A1 |
20110321122 | Mwangi et al. | Dec 2011 | A1 |
20120016994 | Nakamura et al. | Jan 2012 | A1 |
20120039341 | Latif et al. | Feb 2012 | A1 |
20120041965 | Vasquez et al. | Feb 2012 | A1 |
20120063314 | Pignataro et al. | Mar 2012 | A1 |
20120066489 | Ozaki et al. | Mar 2012 | A1 |
20120096461 | Goswami et al. | Apr 2012 | A1 |
20120101952 | Raleigh et al. | Apr 2012 | A1 |
20120117028 | Gold et al. | May 2012 | A1 |
20120131627 | Chittelia | May 2012 | A1 |
20120140620 | Hogan | Jun 2012 | A1 |
20120150805 | Pafumi et al. | Jun 2012 | A1 |
20120195273 | Iwamura et al. | Aug 2012 | A1 |
20120254293 | Winter et al. | Oct 2012 | A1 |
20120255022 | Ocepek et al. | Oct 2012 | A1 |
20120257506 | Bazlamacci et al. | Oct 2012 | A1 |
20120258766 | Cho et al. | Oct 2012 | A1 |
20120311153 | Morgan | Dec 2012 | A1 |
20120317266 | Abbott | Dec 2012 | A1 |
20130058229 | Casado et al. | Mar 2013 | A1 |
20130100819 | Anchan | Apr 2013 | A1 |
20130182713 | Giacomoni et al. | Jul 2013 | A1 |
20130198511 | Yoo et al. | Aug 2013 | A1 |
20130238472 | Fan et al. | Sep 2013 | A1 |
20130269007 | Yoshigaki | Oct 2013 | A1 |
20130336122 | Baruah et al. | Dec 2013 | A1 |
20130336126 | Vasseur | Dec 2013 | A1 |
20140025823 | Szabo et al. | Jan 2014 | A1 |
20140040478 | Hsu et al. | Feb 2014 | A1 |
20140071895 | Bane et al. | Mar 2014 | A1 |
20140089384 | Diaz | Mar 2014 | A1 |
20140089657 | Eguchi | Mar 2014 | A1 |
20140095661 | Knowles et al. | Apr 2014 | A1 |
20140099945 | Singh et al. | Apr 2014 | A1 |
20140105069 | Potnuru | Apr 2014 | A1 |
20140113600 | El Gamal | Apr 2014 | A1 |
20140187199 | Yan et al. | Jul 2014 | A1 |
20140286316 | Park et al. | Sep 2014 | A1 |
20150058595 | Gura et al. | Feb 2015 | A1 |
20160021110 | Sugano | Jan 2016 | A1 |
20160070601 | Yamamoto | Mar 2016 | A1 |
20160241389 | Le Saint | Aug 2016 | A1 |
20160373414 | MacCarthaigh | Dec 2016 | A1 |
20180115521 | Bansal | Apr 2018 | A1 |
Number | Date | Country |
---|---|---|
2080530 | Apr 1994 | CA |
0605088 | Jul 1994 | EP |
0744850 | Nov 1996 | EP |
1081918 | Mar 2001 | EP |
06-205006 | Jul 1994 | JP |
8021924 | Mar 1996 | JP |
2000183935 | Jun 2000 | JP |
WO 9114326 | Sep 1991 | WO |
WO 9505712 | Feb 1995 | WO |
WO 9709805 | Mar 1997 | WO |
WO 9745800 | Dec 1997 | WO |
WO 9905829 | Feb 1999 | WO |
WO 9906913 | Feb 1999 | WO |
WO 9910858 | Mar 1999 | WO |
WO 9939373 | Aug 1999 | WO |
WO 9964967 | Dec 1999 | WO |
WO 0004422 | Jan 2000 | WO |
WO 0004458 | Jan 2000 | WO |
WO 0058870 | Oct 2000 | WO |
WO 0239696 | May 2002 | WO |
WO 2006091040 | Aug 2006 | WO |
Entry |
---|
Authors: Ueli M. Maurer and Pierre E. Schmid “A Calculus for Secure Channel Establishment in Open Networks” pp. 18 (Year: 1994). |
Getting an A+ on the Qualys SSL Test—Windows Edition by “Scott Helme” Jan. 11, 2015 pp. 23 (Year: 2015). |
Redirection and cipher suite override based on SSL/TLS configuration now available Sep. 8, 2015 by Tushar Richabadas pp. 8 (Year: 2015). |
Penetration testing tips for your Netscaler—From the Architect http://neil.spellings.net/ pp. 08, Jan. 12, 2014. |
Getting an A+ on the Qualys SSL Test—Windows Edition by Scott Helme pp. 23 Jan. 11, 2015. |
Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations by C. Michael Chernick, Charles Edington III, Matthew J. Fanto, Rob Rosenthal pp. 33; Jun. 2005. |
F5 Networks Inc., “BIG-IP ASM 12.0.0”, Release Notes, Jul. 17, 2017, pp. 1-14, vol. 12.0, F5 Networks, Inc., Retrieved from the Internet<https://support.f5.com/kb/en-us/products/big-ip_asm/releasenotes/product/relnote-asm-12-0-0.html>. |
F5 Networks Inc., “BIG-IP Application Security Manager Operations Guide”, Manual, Feb. 5, 2016, pp. 1-98, F5 Networks, Inc., Retrieved from the Internet<https://support.f5.com/kb/en-us/products/big-ip_asm/manuals/product/f5-asm-operations-guide.html>. |
F5 Networks Inc., “BIG-IP® Local Traffic Management: Basics”, Manual, Mar. 17, 2016, pp. 1-68, vol. 12.0, F5 Networks, Inc. |
F5 Networks Inc., “F5 BIG-IP TMOS: Operations Guide”, Manual, Mar. 5, 2015, pp. 1-236, F5 Networks, Inc., Retrieved from the Internet<https://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/f5-tmos-operations-guide.html>. |
F5 Networks Inc., “BIG-IP® Application Security Manager™: Implementations”, Manual, Sep. 28, 2017, pp. 1-372, vol. 12.0, F5 Networks, Inc., Retrieved from the Internet<https://support.f5.com/kb/en-us/products/big-ip_asm/manuals/product/ams-implementations-12-0-0.html>. |
F5 Networks Inc., “BIG-IP® TMOS: Implementations”, Manual, Dec. 21, 2015, pp. 1-280, vol. 12.0, F5 Networks, Inc., Retrieved from the Internet<hhttps://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/tmos-implementations-12-0-0.html>. |
“A Process for Selective Routing of Servlet Content to Transcoding Modules,” Research Disclosure 422124, Jun. 1999, pp. 889-890, IBM Corporation. |
“BIG-IP Controller with Exclusive OneConnect Content Switching Feature Provides a Breakthrough System for Maximizing Server and Network Performance,” F5 Networks, Inc. Press Release, May 8, 2001, 2 pages, Las Vegas, Nevada. |
“Diameter MBLB Support Phase 2: Generic Message Based Load Balancing (GMBLB)”, pp. 1-10, <https://peterpan.f5net.com/twiki/bin/view/TMOS/TMOSDiameterMBLB>, last accessed Mar. 29, 2010. |
“Market Research & Releases, CMPP PoC documentation”, <http://mainstreet/sites/PD/Teams/ProdMgmt/MarketResearch/Universal>, last accessed Mar. 29, 2010. |
“Market Research & Releases, Solstice Diameter Requirements”, <http://mainstreet/sites/PD/Teams/ProdMgmt/MarketResearch/Universal>, last accessed Mar. 29, 2010. |
“Respond to server depending on TCP::client_port”, pp. 1-6, DevCentral Forums iRules, <http://devcentral.f5.com/Default.aspx?tabid=53&forumid=5&tpage=1&v>, last accessed Mar. 26, 2010. |
“Servlet/Applet/HTML authentication process with single sign-on,” Research Disclosure 429128, Jan. 2000, pp. 163-164, IBM Corporation. |
“Traffic Surges; Surge Queue; Netscaler Defense,” 2005, PowerPoint Presentation, slides 1-12, Citrix Systems, Inc. |
“UDDI Overview”, Sep. 6, 2000, pp. 1-21, uddi.org (http://www.uddi.org/). |
“UDDI Technical White Paper,” Sep. 6, 2000, pp. 1-12, uddi-org, (http://www.uddi.org/). |
“UDDI Version 3.0.1 UDDI Spec Technical Committee Specification”, Oct. 14, 2003, pp. 1-383, uddi.org, (http://www.uddi.org/). |
“Windows Server 2003 Kerberos Extensions,” Microsoft TechNet, 2003 (Updated Jul. 31, 2004), http;//technet.microsoft.com/en-us/library/cc738207, Microsoft Corporation. |
Abad, C., et al. “An Analysis on the Schemes for Detecting and Preventing ARP Cache Poisoning Attacks”, IEEE, Computer Society, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07), 2007, pp. 1-8. |
ASP.NET Forums, “How to Remove Cookie Sessionid from Outgoing Response?,” at Microsoft ASP.NET, pp. 1-4 (Dec. 2009). |
Baer, T., et al., “The elements of Web services” ADTmag.com, Dec. 1, 2002, pp. 1-6, (http://www.adtmag.com). |
Blake-Wilson et al., “Transport Layer Security (TLS) Extensions,” (Apr. 2006). |
Blue Coat, “Technology Primer; CIFS Protocol Optimization,” Blue Coat Systems, Inc., 2007, pp. 1-3, (http://www.bluecoat.com). |
Chou, Wesley, “Inside SSL: Accelerating Secure Transactions”, IEEE(2002). |
Crescendo Networks, “Application Layer Processing (ALP),” 2003-2009, pp. 168-186, Chapter 9, CN-5000E/5500E, Foxit Software Company. |
Eastlake, 3rd Huawei D, “Transport Layer Security (TLS) Extensions: Extension Definitions,” RFC:6066 pp. 1-25 (Jan. 18, 2011). |
F5 Networks Inc., “3-DNS® Reference Guide, version 4.5”, F5 Networks Inc., Sep. 202, pp. 2-1-2-28, 3-1-3-12, 5-1-5-24, Seattle Washington (2002). |
F5 Networks Inc., “Big-IP® Reference Guide, version 4.5”, F5 Networks Inc., Sep. 2002, pp. 11-1-11-32, Seattle Washington. |
F5 Networks Inc., “Case Information Log for ‘Issues with BoNY upgrade to 4.3’”, as early as Feb. 2008. |
F5 Networks Inc., “Configuration Guide for Local Traffic Management,” F5 Networks Inc., Jan. 2006, version 9.2.2, 406 pgs. |
“Deploying the BIG-IP-LTM for Diameter Load Balancing”, Deployment Guide, Version 1.0, Sep. 2010, 21 pages. |
F5 Networks Inc., F5 Diameter RM, PowerPoint document, Jul. 16, 2009, pp. 1-7. |
F5 Networks Inc., “F5 WANJet CIFS Acceleration”, White Paper, F5 Networks Inc., Mar. 2006, pp. 1-5, Seattle, Washington. |
F5 Networks Inc., “Routing Global Internet Users to the Appropriate Data Center and Applications Using F5's 3-DNS Controller”, F5 Networks Inc., Aug. 2001, pp. 1-4, Seattle Washington, (http://www.f5.com/f5products/3dns/relatedMaterials/Using/F5.html). |
F5 Networks Inc., “Using F5's-DNS Controller to Provide High Availability Between Two or More Data Centers”, F5 Networks Inc., Aug. 2001, pp. 1-4, Seattle, Washington, (http://www.f5.com/f5products/3dns/relatedMaterials/3DNSRouting.html). |
F5 Networks, “BIG-IP® Local Traffic Manager™: Concept,” Version 11.1, retrieved from Internet: URL:http//support.f5.com/content/kb/en-us/products/big-ip_ltm/manuals/product/ltm-concepts-11-1-0/_jcr_content/pdfAttach/download/file.res/ltm-concepts-11-1-0.pdf retrieved on Apr. 3, 2013] Sections 1, 2, 5, and 11 (Nov. 10, 2011). |
F5 Networks, “Configuration Guide for BIG-IP Global Traffic Manager”, version 10.2, Oct. 21, 2011, pp. 1-350, https://support.f5.com/content/kb/en-us/products/big-ip_gtm/manuals/product/gtm_config_10_2/_jcr_content/pdfAttach/download/file.res/Configuration_Guidefor_BIG-IP_Global_Traffic_Manager.pdf. |
F5 Networks, Inc., “F5 and VMware Integration Streamlines App Provisioning Process”, F5 Networks Inc., Solution Overview, Jun. 24, 2013, pp. 1-2, <www.f5.com>. |
Fajardo, Victor 1., “Open Diameter Software Architecture,” Jun. 25, 2004, pp. 1-6, Version 1.0.7, http://diameter.sourceforge.net/diameter-architecture/index.html. |
Fielding et al., “Hypertext Transfer Protocol—HTTP/1.1,” Network Working Group, RFC: 2068, Jan. 1997, pp. 1-162. |
Fielding et al., “Hypertext Transfer Protocol—HTTP/1.1,” Network Working Group, RFC: 2616, Jun. 1999, pp. 1-176, The Internet Society. |
Floyd et al., “Random Early Detection Gateways for Congestion Avoidance,” Aug. 1993, pp. 1-22, IEEE/ACM Transactions on Networking, California. |
Greenicicle, “Using the Silverlight HttpClient in WCF, and Still Passing Cookies,” at http://greenicicleblog.com, pp. 1-8 (Oct. 2009). |
Gupta et al., “Algorithms for Packet Classification”, Computer Systems Laboratory, Stanford University, CA, Mar./Apr. 2001, pp. 1-29. |
Heinz G., “Priorities in Stream Transmission Control Protocol (SCTP) Multistreaming”, Thesis submitted to the Faculty of the University of Delaware, Spring 2003, pp. 1-35. |
Hochmuth, Phil, “F5, CacheFlow pump up content-delivery lines,” Network World Fusion, May 4, 2001, 1 page, Las Vegas, Nevada. |
Ilvesmaki M., et al., “On the capabilities of application level traffic measurements to differentiate and classify Internet traffic,” Presented in SPIE's International Symposium IT.com, Aug. 19-21, 2001, pp. 1-11, Denver, Colorado. |
Imperva, “Imperva Technical Brief; SecureSphere and the OWASP Top Ten,” Imperva US Headquarters, Foster City, CA (3 pages) (2008). |
IMPERVA, “Web Application Firewall,” IMPERVA Headquarters, Redwood Shores, CA (4 pages) (2010). |
International Search Report and Written Opinion for International Patent Application No. PCT/US2013/026615, dated Jul. 4, 2013. |
International Search Report and Written Opinion for International Patent Application No. PCT/US2013/026262 (dated May 17, 2013). |
Internet Protocol, “DARPA Internet Program Protocol Specification,” (RFC:791), Information Sciences Institute, University of Southern California, Sep. 1981, pp. 1-49. |
Kawamoto D., “Amazon files for Web services patent”, CNET News.com, Jul. 28, 2005, pp. 1-2, (http://news.com). |
Lamonica M., “Infravio spiffs up Web services registry idea”, CNET News.com, May 11, 2004, pp. 1-2, (http://www.news.com). |
Mac Vittie, Lori, “Message-Based Load Balancing: Using F5 solutions to address the challenges of scaling Diameter, RADIUS, and message-oriented protocols”, F5 Technical Brief, 2005, pp. 1-9, F5 Networks, Inc., Seattle, WA. |
MacVittie, L. “Cloud Balancing: The Evolution of Global Server Load Balancing”, White Paper, F5 Networks, Inc., Nov. 2, 2012, pp. 1-12. |
Macvittie, Lori, “Message-Based Load Balancing,” Technical Brief, Jan. 2010, pp. 1-9, F5 Networks, Inc. |
Masone et al., “WSKE: Web Server Key Enabled Cookies,” Department of Computer Science, Dartmouth College, Hanover, NH (13 pages) (2007). |
Miller, “Persistent Login Cookie Best Practice,” The Fishbowl Weblog at http://fishbowl.patiche.org/, pp. 1-6 (2004). |
Modiano E., “Scheduling Algorithms for Message Transmission Over a Satellite Broadcast System”, MIT Lincoln Laboratory Advanced Network Group, Nov. 1997, pp. 1-7. |
Murdoch, “Hardened Stateless Session Cookies,” University of Cambridge, Computer Laboratory, pp. 1-9 (Apr. 2008). |
NET, “Get MAC for Remote Computer,” NET Framework Developer Center at http://msdn.microsoft.com/en-us/netframework/aa496123.aspx, pp. 1-2 (2008). |
Nichols K., et al., “Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers”, (RFC:2474) Network Working Group, Dec. 1998, pp. 1-19, (http://ietf.org/rfc/rfc2474.txt). |
Oracle, “Configuring Oracle Web Cache for Session Binding and Load Balancing,” Oracle Technology Network at http://www.oracle.com/technology/index.html, pp. 1-6 (2004). |
Ott D., et al., “A Mechanism for TCP-Friendly Transport-level Protocol Coordination”, USENIX Annual Technical Conference, 2002, University of North Carolina at Chapel Hill, pp. 1-12. |
OWASP, “Testing for Cross site scripting”, OWASP Testing Guide v2, Table of Contents, Feb. 24, 2011, pp. 1-5, (www.owasp.org/index.php/Testing_for_Cross_site_scripting). |
Padmanabhan V., et al., “Using Predictive Prefetching to Improve World Wide Web Latency”, SIGCOM, 1996, pp. 10-15. |
Prosise, “Foiling Session Hijacking Attempts,” msdn, Wicked Code at http://msdn.microsoft.com/en-us/magazine/default.aspx, pp. 1-6 (Jul. 2004). |
Rosen E., et al., “MPLS Label Stack Encoding”, (RFC:3032) Network Working Group, Jan. 2001, pp. 1-22, (http://www.ietf.org/rfc/rfc3032.txt). |
Schaefer, Ken, “IIS and Kerberos Part 5—Protocol Transition, Constrained Delegation, S4U2S and S402P,” Jul. 18, 2007, 21 pages, http://www.adopenstatic.com/cs/blogs/ken/archive/2007/07/19/8460.aspx. |
Schilit B., “Bootstrapping Location-Enhanced Web Services”, University of Washington, Dec. 4, 2003, (http://www.cs.washington.edu/news/cooloq.info.html). |
Seeley R., “Can Infravio technology revive UDDI?”, ADTmag.com, Oct. 22, 2003, (http://adtmag.com). |
Shohoud Y., “Building XML Web Services with VB .NET and VB 6”, Addison Wesley, 2002, pp. 1-14. |
Sleeper B., “The Evolution of UDDI: UDDI.org White Paper”, the Stencil Group, Inc., Jul. 19, 2002, pp. 1-15, San Francisco, California. |
Sleeper B., “Why UDDi Will Succeed, Quietly: Two Factors Push Web Services Forward”, The Stencil Group, Inc., Apr. 2001, pp. 1-7, San Francisco, California. |
Sommers F., “Whats New in UDDI 3.0—Part 1”, Web Services Papers, Jan. 27, 2003, pp. 1-14, (http://www.webservices.org/index.php/article/articleprint/871/-1/24/. |
Sommers F., “Whats New in UDDI 3.0—Part 2”, Web Services Papers, Mar. 2, 2003, pp. 1-8, (http://www.web.archive.org/web/20040620131006/). |
Sommers F., “Whats New in UDDI 3.0—Part 3”, Web Services Papers, Sep. 2, 2003, pp. 1-4, (http://www.webservices.org/index.php/article/articleprint/894/-1/24). |
Supportwiki, “Web: Cookies,” from SupportWiki at http://wiki.livejournal.org/index.php/Main_Page, pp. 1-3 (Feb. 2008). |
Tridgell et al., “rsync,” retrieved from http://en.wilipedia.org/wiki/Rsync, 7 pages (Jan. 27, 2012). |
Varjabedian, “Bullet Proof Cookies,” ASP.NET Web Development CodeProject at http://www.codeproject.com, pp. 1-6 (2007). |
Wang B., “Priority and realtime data transfer over the best-effort Internet”, Dissertation Abstract, 205, ScholarWorks@UMASS (2005). |
Wikipedia, “Diameter (protocol)” pp. 1-11, <http://en.wikipedia.org/wiki/Diamter_(protocol)>, last accessed Oct. 27, 2010. |
Wilkes, S., “Automating F5 Application Services for WMware with F5 BIG-IQ Cloud”, F5 Networks, Inc., White Paper, Apr. 26, 2013, pp. 1-9, <www.f5.com>. |
Williams et al., “Forwarding Authentication,” The Ultimate Windows Server 2003 System Administrator's Guide, 2003, 2 pages, Figure 10.7, Addison-Wesley Professional, Boston, Massachusetts. |
Woo T.Y.C., “A Modular Approach to Packet Classification: Algorithms and Results”, Bell Laboratories, Lucent Technologies, Mar. 2000, pp. 1-10. |
Number | Date | Country | |
---|---|---|---|
62415607 | Nov 2016 | US |