1. Field
This invention relates generally to data networking, and more specifically, to a system and method to apply a network traffic policy based on a user identity during an application session.
2. Related Art
The secure data network of a company is a critical component for day-to-day functioning of company business activities. Company employees access the secure data network for communication within the company and with the outside world. Company information, oftentimes proprietary or confidential, is exchanged during the communication.
Typically, an employee gains access to the company's secure data network by means of a network logon procedure using a private user identity, such as a user name “Robert P. Williamson” or an employee number “NG01-60410”. Subsequent information exchange using the company's office applications, such as email, file transfer or document control is traceable based on the private user identity through network event logs.
Since the late 1990's, we have been witnessing the phenomenal rising popularity of public communication applications and services, such as email and Instant Messaging offered by Yahoo™, America Online™ (AOL), or Google™ conferencing and collaboration services offered by WebEx™ or Centra™, or peer-to-peer services for a variety of file sharing. Generally, a public communication service allows a user to exchange information through messaging, text chat or document exchange using a public user identity, such as “butterdragon”, “fingernail1984”, or “peterrabbit”.
However, in a company setting, when an employee connects to a public communication service with a public user identity over the company's secure data network, the information exchange is not easily traceable if at all since the public user identity is not tied to the private user identity.
In one example, a company's information technology (IT) department notices that an employee Victor has been using the company's email system to send out proprietary documents, violating the company's security policy. After issuing a warning to Victor, the IT department finds no further violations. Unfortunately, they are not aware of the fact that Victor has continued this activity using Yahoo™ email with a public user identity “PiratesOfCaribbean@Yahoo.com”.
In another example, two weeks before a major trade show, a company implements a security measure to monitor communication activities of employees of director level and above to ensure confidentiality of competitive information. This security measure, covering company email, phone conversation and voice messaging, nevertheless proves to be a failure as sensitive information leaks out to a business reporter anyway prior to the trade show. The source of the leak may never be confirmed, but the business reporter privately discloses that he gets the information from an anonymous employee of the company using AOL Instant Messaging™ with screen name “opensecret2006”.
The above discussion illustrates the need for a security solution to associate a user identity to a public application.
Method for applying a security policy to an application session, includes: recognizing the application session between a network and an application via a security gateway; determining by the security gateway a user identity of the application session using information about the application session; obtaining by the security gateway the security policy comprising network parameters mapped to the user identity; and applying the security policy to the application session by the security gateway. The user identity may be a network user identity or an application user identity recognized from packets of the application session. The security policy may comprise a network traffic policy mapped and/or a document access policy mapped to the user identity, where the network traffic policy is applied to the application session. The security gateway may further generate a security report concerning the application of the security policy to the application session. The security policy may be a forwarding policy.
a illustrates a secure network.
b illustrates an access session and an application session.
c illustrates an access session record and an application session record.
a illustrates a process to determine a public user identity of application session.
b illustrates a data packet in an AIM log-on packet.
a illustrates a secure network.
A secure network 160 includes a host 130. User 120 uses host 130 to access a public application 180 hosted in application server 190. Application server 190 is outside of secure network 160. The network traffic between host 130 and application server 190 passes through security gateway 150. The security gateway 150 is operationally coupled to a processor 171 and a computer readable medium 172. The computer readable medium 172 stores computer readable program code for implementing the various embodiments of the present invention as described herein.
Host 130 is a computing device with network access capabilities. The host 130 is operationally coupled to a processor 173 and a computer readable medium 174. The computer readable medium 174 stores computer readable program code for implementing the various embodiments of the present invention as described herein. In one embodiment, host 130 is a workstation, a desktop personal computer or a laptop personal computer. In one embodiment, host 130 is a Personal Data Assistant (PDA), a smartphone, or a cellular phone.
In one embodiment, secure network 160 is an Internet Protocol (IP) network. In one embodiment, secure network 160 is a corporate data network or a regional corporate data network. In one embodiment, secure network 160 is an Internet service provider network. In one embodiment, secure network 160 is a residential data network. In one embodiment, secure network 160 includes a wired network such as Ethernet. In one embodiment, secure network 160 includes a wireless network such as a WiFi network.
Public application 180 provides a service that allows user 120 to communicate with other users in a real-time fashion. In one embodiment, the service includes text chat. In one embodiment, the service includes a voice call or a video call. In one embodiment, the service includes a network game. In one embodiment, the service includes exchanging a document, such as sending or receiving a text document, a PowerPoint™ presentation, an Excel™ spreadsheet, an image file, a music file or a video clip. In one embodiment, the service includes a collaborative document processing such as creating a document, a business plan, an agreement, wherein user 120 collaborates with other users in a real time fashion. In one embodiment, the service includes a collaborative information exchange such as a conference call. In one embodiment, the service is a social networking service. In one embodiment, the service includes real-time collaboration and non real-time collaboration.
In one example, public application 180 provides America Online Instant Messenger™ service. In one example, public application 180 provides Yahoo Instant Messenger™ voice service. In one embodiment, public application 180 provides a file sharing service such as Kazaa™ file sharing service. In one embodiment, public application 180 provides a network game service such as Microsoft™ Network Game service. In one embodiment, public application 180 provides an on-line collaborative document processing such as Google Docs™, and Salesforce.com™. In one embodiment, public application 180 provides an on-line information exchange and communications such as WebEx™. In one embodiment, public application 180 provides live information streaming such as live video streaming, live audio streaming, and instantaneous picture uploading.
Security gateway 150 is situated at the edge of secure network 160. Security gateway 150 connects secure network 160 to public application 180. Security gateway 150 receives network traffic from secure network 160 and transmits the network traffic to application server 190. Likewise, security gateway 150 receives network traffic from application server 190 and transmits the network traffic to secure network 160.
In one embodiment, security gateway 150 includes the function of a corporate Wide Area Network (WAN) gateway. In one embodiment, security gateway 150 includes the function of a residential broadband gateway. In one embodiment, security gateway 150 includes the function of a WAN gateway for an Internet service provider.
b illustrates an access session and an application session.
User 120 uses host 130 to access secure network 160 during an access session 162.
Host 130 has a host identity 134. Host 130 uses host identity 134 to connect to secure network 160. In one embodiment, host identity 134 includes an IP address. In one embodiment, host identity 134 includes a Media Access Control (MAC) address.
Within secure network 160, user 120 has a private user identity 124. In one embodiment, private user identity 124 is an employee number or an employee name. In one embodiment, private user identity 124 is an Internet service subscription identity. In one embodiment, access session 162 is established after a successful network user log-in procedure, such as an employee network log-in, for secure network 160 using private user identity 124. Private user identity 124 is associated with host identity 134. In one embodiment, host 130 is a guest computing device. Private user identity 124 is associated with an Ethernet switch port where host 130 connects. In this embodiment, private user identity 124 is a port number, an Ethernet interface identity, or an Ethernet VLAN identity.
User 120 uses host 130 to access public application 180 in an application session 182. User 120 uses a public user identity 127 during application session 182. In one embodiment, public application 180 prompts user 120 to log-in before establishing application session 182. During the application user log-in procedure, user 120 provides to public application 180 public user identity 127. In another embodiment, public application 180 selects a public user identity 127 for user 120 for application session 182. In one embodiment, public user identity 127 is set up through a user registration process or a service subscription process. Network traffic in application session 182 passes through security gateway 150.
c illustrates an access session record and an application session record.
Access session record 164 records information about access session 162. The information includes private user identity 124, host identity 134 and access session time 166. In one embodiment, access session time 166 is the starting time when access session 162 is established. In one embodiment, access session time 166 includes the starting time and the ending time when user 120 finishes access session 162. In one embodiment, access session time 166 is a time stamp for a time during access session 162.
Application session record 184 records information about application session 182. The information includes private user identity 124, public user identity 127, and application session time 186. In one embodiment, the information further includes host identity 134. In one embodiment, application session time 186 includes the starting time when application session 182 is established. In one embodiment, application session time 186 includes a time stamp during application session 182. In one embodiment, application session time 186 includes a time stamp when security gateway 150 recognizes application session 182.
The process of generating application session record 184 includes multiple steps.
In step 201, security gateway 150 recognizes an application session.
In step 202, security gateway 150 determines a public user identity of the application session.
In step 203, security gateway 150 determines a private user identity using information about the application session.
Security gateway 150 inspects network traffic between host 130 and application server 190 to recognize application session 182 for public application 180.
In one embodiment, security gateway 150 inspects data packet 339 between host 130 and application server 190 for the recognition of application session 182.
Security gateway 150 includes an application identifier 355 for public application 180. Application identifier 355 includes information for recognizing application session 182. In one embodiment, application identifier 355 includes a transport layer information, such as Transmission Control Protocol (TCP) or User Diagram Protocol (UDP); and at least one transport port number, such as a TCP port number or a UDP port number. In one embodiment, application identifier 355 includes application layer information, such as one or more data filters wherein a data filter specifies a value and a position of the value in a data packet. In one example, a data filter is [byte 0 with value “0x52”]. In one example, a data filter is [byte 4-7 with ASCII value of “ADEH”].
Security gateway 150 matches data packet 339 against application identifier 355.
In one embodiment, application identifier 355 includes transport protocol type of TCP and a destination TCP port number of 5190, the TCP port number used by AIM protocol. In this embodiment, data packet 339 is a TCP packet from host 130 to application server 190. Security gateway 150 matches data packet 339 against application identifier 355 and determines that public application 180 provides AIM service.
Security gateway 150 creates application session record 184. Security gateway 150 extracted the source IP address from the IP header of data packet 339, and stores the source IP address as host identity 134. In one embodiment, data packet 339 includes link layer information, such as a source MAC address; security gateway 150 extracts and stores the source MAC address as host identity 134.
In one embodiment, security gateway 150 connects to a clock 359. Clock 359 indicates the current time of day. Security gateway 150 stores the time of day indicated by clock 359 in application session time 186.
a illustrates a process to determine a public user identity of application session 182.
The method for determining public user identity 127 is typically specific to public application 180. In one embodiment, data packet 339 is an application packet. For example, public application 180 provides AIM service; data packet 339 is an AIM packet.
An AIM packet includes multiple fields, for example
An AIM log-on packet is a AIM packet with family field having a fixed hexadecimal value of “0x00 0x17” and subtype field having a fixed hexadecimal value of “0x00 0x06”.
AIM log-on packet further includes buddy name length field, a 1-byte integer starting at byte offset 19, and a variable length buddy name field starting at byte offset 20. Buddy name length field indicates the length in bytes of buddy name field.
Security gateway 150 matches data packet 339 to determine if data packet 339 is an AIM log-on packet. In one embodiment, data packet 339 is an AIM log-on packet 400 illustrated in
In one embodiment, data packet 339 is not an AIM log-on packet. Security gateway 150 inspects another data packet from host 130.
Secure network 160 includes an identity server 570. The identity server 570 is operationally coupled to a processor 581 and a computer readable medium 582. The computer readable medium 582 stores computer readable program code for implementing the various embodiments of the present invention as described herein. Identity server 570 includes access session record 164 of access session 162 during which user 120 accesses application session 182.
Security gateway 150 queries identity server 570. Security gateway 150 sends host identity 134 and application session time 186 to identity server 570.
Identity server 570 receives host identity 134 and application session time 186. Identity server 570 matches host identity 134 and application session time 186 against access session record 164. Identity server 570 determines that host identity 134 matches host identity of access session record 164. Identity server 570 further determines that application session time 186 matches access session time 166 of access session record 164 as application session time 186 is between the starting time and the ending time of access session record 164. Identity server 570 sends private user identity 124 of access session record 164 to security gateway 150 as a response to the query.
Security gateway 150 receives private user identity 124 from identity server 570, and stores private user identity 124 in application session record 184.
In one embodiment, security gateway 150 stores public user identity 127 in application session record 184 after recognizing a log-on approval indication for the public user identity 127 from public application 180.
In one embodiment, security gateway 150 queries identity server 570 immediately after determining public user identity 127. In one embodiment, security gateway 150 queries identity server 570 after application session 182 ends.
In one embodiment, security gateway 150 queries identity server 570 by sending a plurality of host identities in a bulk request; and receives a plurality of private user identities in a bulk response.
In one embodiment, application session record 184 includes additional user information associated with private user identity 124, such as cubicle or office number, cubicle or office location, telephone number, email address, mail-drop location, department name/identity, or manager name.
In one embodiment, security gateway 150 obtains the additional user information from identity server 570. In one embodiment, security gateway 150 obtains the additional user information by querying a different server, such as a corporate directory server, by using the private user identity 124 received from identity server 570.
In one embodiment, public application 180 provides file transfer service using File Transfer Protocol (FTP) protocol or a proprietary protocol. In one embodiment, public application 180 provides email service using Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol (IMAP) or Post Office Protocol version 3 (POP3) protocol.
By using the application session record, the private user identity 124 and the public user identity 127 for an application session 182 may be determined. In one embodiment as illustrated by
Security gateway 150 queries corporate directory 470 for a security policy, where the query includes user identity 424. User identity 424 may include private user identity 124 or public user identity 127. Corporate directory 470 matches user identity 424 against security policy 402 and determines security policy 402 is applicable to user identity 424. In one embodiment security policy 402 maps network parameters to a user identity and there is a match between user identity 424 and the user identity in the security policy 402. In one embodiment, security policy 402 maps network parameters to a group identity (not shown) and user identity 424 is a member of the group identity. In response to finding the match between the user identity 424 and the user identity in the security policy 402, corporate directory 470 sends security policy 402 to security gateway 150. In some embodiments, the response may also be referred to as a returned policy.
In one embodiment, security gateway 150 generates security report 475 based on application session record 184 and security policy 402. In one embodiment, security gateway 150 generates security report 475 based on a pre-determined user identity or a list of pre-determined user identities. For example, the security report may be generated based on an input of user identity or identities. In one embodiment, security gateway 150 generates security report 475 based on a pre-defined schedule or when requested by an operator.
In one embodiment, security policy 402 includes a security control function as illustrated in
In one embodiment, network traffic policy 451 includes a traffic shaping control. In one example, traffic shaping control specifies a TCP profile such as a change of window segment size, or a TCP window adjustment.
In one embodiment, network traffic policy 451 indicates session connection rate control based on user identity 424 specifying a rate or capacity such as 10 session connections per second, 35 concurrent sessions, 100 sessions during lunch hour, 500 sessions a day, 24 voice sessions a day, or 75 file transfer sessions an hour. In one embodiment, network traffic policy 451 may specify, when exceeding the rate or capacity, if application session 182 is denied or data packets 439 of application session 182 are dropped.
In one embodiment, network traffic policy 451 includes application session modification control mapped to user identity 424, specifying how data packets 439 of application session 182 are modified for the user with the user identity 424. In one example, application session modification control specifies security gateway 150 should perform network address translation (NAT) to application session 182 for user identity 424. In one example, security gateway 150 should perform port address translation (PAT) to application session 182 using a pre-determined port number for user identity 424. In another example, security gateway 150 should perform content substitution if application session 182 is a HTTP session and if a Universal Resource Locator (URL) in data packets 439 of application session 182 matches a pre-determined URL for user identity 424. In an example, security gateway 150 should perform filename substitution if application session 182 is a file transfer session and if a filename matching a pre-determined filename is found in data packets 439 of application session 182 for user identity 424. In another example, security gateway 150 should insert a cookie for user identity 424 if application session 182 is an HTTP session, with optionally data packets 439 matching a pre-determined POST or GET request of a URL.
Returning to
In one embodiment security policy 402 includes time 457 where security policy 402 is applicable within time 457. In one embodiment, time 457 indicates a beginning time such as 8 am, 4 pm, or midnight. In an embodiment, time 457 indicates a time range such as 8 am to 10 am, 7 pm to 5 am, morning hours, lunch, rush hour, prime time. Security gateway 150 compares clock 359 with time 457 and determines if security policy 402 is applicable.
In one embodiment, security gateway 150 generates security message 472 when security gateway 150 determines if security policy 402 is applicable to application session 182 for user identity 424. In one embodiment, security gateway generates security message 472 when security gateway 150 applies security policy 402 to application session 182. In one embodiment, security report 475 includes security message 472. In one example, security message 472 includes security policy 402 and user identity 424. In one example, security message 472 includes the actions security gateway 150 applies to application session 182 using security policy 402.
The invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, etc.
Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
Input/output or I/O devices (including but not limited to keyboards, displays, point devices, etc.) can be coupled to the system either directly or through intervening I/O controllers.
Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
Foregoing described embodiments of the invention are provided as illustrations and descriptions. They are not intended to limit the invention to precise form described. In particular, it is contemplated that functional implementation of invention described herein may be implemented equivalently in hardware, software, firmware, and/or other available functional components or building blocks, and that networks may be wired, wireless, or a combination of wired and wireless. Other variations and embodiments are possible in light of above teachings, and it is thus intended that the scope of invention not be limited by this Detailed Description, but rather by Claims following.
The present application is a continuation of, and claims the priority benefit of, co-pending U.S. patent application Ser. No. 13/650,179 filed on Oct. 12, 2012 and titled “System and Method to Apply Network Traffic Policy to an Application Session”, now U.S. Pat. No. 8,595,791 issued on Nov. 26, 2013, which is in turn a continuation of co-pending U.S. patent application Ser. No. 12/788,339 filed on May 27, 2010 and titled “System and Method to Apply Network Traffic Policy to an Application Session”, now U.S. Pat. No. 8,312,507 issued on Nov. 13, 2012, which in turn in a continuation-in-part of U.S. patent application Ser. No. 12/771,491 filed on Apr. 30, 2010 and titled “System and Method to Associate a Private User Identity with a Public User Identity”, now U.S. Pat. No. 7,979,585 issued on Jul. 12, 2011, which in turn is a continuation of U.S. patent application Ser. No. 11/582,613 filed on Oct. 17, 2006 and titled “System and Method to Associate a Private User Identity with a Public User Identify”, now U.S. Pat. No. 7,716,378 issued on May 11, 2010. All of the above disclosures are incorporated by reference herein in their entirety.
Number | Name | Date | Kind |
---|---|---|---|
5774660 | Brendel et al. | Jun 1998 | A |
5935207 | Logue et al. | Aug 1999 | A |
5958053 | Denker | Sep 1999 | A |
6047268 | Bartoli et al. | Apr 2000 | A |
6219706 | Fan et al. | Apr 2001 | B1 |
6321338 | Porras et al. | Nov 2001 | B1 |
6374300 | Masters | Apr 2002 | B2 |
6587866 | Modi et al. | Jul 2003 | B1 |
6748414 | Bournas | Jun 2004 | B1 |
6772334 | Glawitsch | Aug 2004 | B1 |
6779033 | Watson et al. | Aug 2004 | B1 |
7010605 | Dharmarajan | Mar 2006 | B1 |
7076555 | Orman et al. | Jul 2006 | B1 |
7181524 | Lele | Feb 2007 | B1 |
7234161 | Maufer et al. | Jun 2007 | B1 |
7236457 | Joe | Jun 2007 | B2 |
7254133 | Govindarajan et al. | Aug 2007 | B2 |
7269850 | Govindarajan et al. | Sep 2007 | B2 |
7277963 | Dolson et al. | Oct 2007 | B2 |
7301899 | Goldstone | Nov 2007 | B2 |
7310686 | Uysal | Dec 2007 | B2 |
7328267 | Bashyam et al. | Feb 2008 | B1 |
7337241 | Boucher et al. | Feb 2008 | B2 |
7343399 | Hayball et al. | Mar 2008 | B2 |
7370353 | Yang | May 2008 | B2 |
7391725 | Huitema et al. | Jun 2008 | B2 |
7398317 | Chen et al. | Jul 2008 | B2 |
7430755 | Hughes et al. | Sep 2008 | B1 |
7467202 | Savchuk | Dec 2008 | B2 |
7506360 | Wilkinson et al. | Mar 2009 | B1 |
7512980 | Copeland et al. | Mar 2009 | B2 |
7533409 | Keane et al. | May 2009 | B2 |
7552323 | Shay | Jun 2009 | B2 |
7584262 | Wang et al. | Sep 2009 | B1 |
7590736 | Hydrie et al. | Sep 2009 | B2 |
7613822 | Joy et al. | Nov 2009 | B2 |
7673072 | Boucher et al. | Mar 2010 | B2 |
7675854 | Chen et al. | Mar 2010 | B2 |
7707295 | Szeto et al. | Apr 2010 | B1 |
7792113 | Foschiano et al. | Sep 2010 | B1 |
7881215 | Daigle et al. | Feb 2011 | B1 |
7970934 | Patel | Jun 2011 | B1 |
7990847 | Leroy et al. | Aug 2011 | B1 |
7991859 | Miller et al. | Aug 2011 | B1 |
8090866 | Bashyam et al. | Jan 2012 | B1 |
8185651 | Moran et al. | May 2012 | B2 |
8191106 | Choyi et al. | May 2012 | B2 |
8224971 | Miller et al. | Jul 2012 | B1 |
8312507 | Chen et al. | Nov 2012 | B2 |
8554929 | Szeto et al. | Oct 2013 | B1 |
8560693 | Wang et al. | Oct 2013 | B1 |
8584199 | Chen et al. | Nov 2013 | B1 |
8595791 | Chen et al. | Nov 2013 | B1 |
RE44701 | Chen et al. | Jan 2014 | E |
8782221 | Han | Jul 2014 | B2 |
8813180 | Chen et al. | Aug 2014 | B1 |
8826372 | Chen et al. | Sep 2014 | B1 |
8897154 | Jalan et al. | Nov 2014 | B2 |
8977749 | Han | Mar 2015 | B1 |
20020032777 | Kawata et al. | Mar 2002 | A1 |
20020078164 | Reinschmidt | Jun 2002 | A1 |
20020091844 | Craft et al. | Jul 2002 | A1 |
20020103916 | Chen et al. | Aug 2002 | A1 |
20020138618 | Szabo | Sep 2002 | A1 |
20020143991 | Chow et al. | Oct 2002 | A1 |
20020178259 | Doyle et al. | Nov 2002 | A1 |
20020194350 | Lu et al. | Dec 2002 | A1 |
20030009591 | Hayball et al. | Jan 2003 | A1 |
20030014544 | Pettey | Jan 2003 | A1 |
20030023873 | Ben-Itzhak | Jan 2003 | A1 |
20030035409 | Wang et al. | Feb 2003 | A1 |
20030035420 | Niu | Feb 2003 | A1 |
20030131245 | Linderman | Jul 2003 | A1 |
20030135625 | Fontes et al. | Jul 2003 | A1 |
20030195962 | Kikuchi et al. | Oct 2003 | A1 |
20040078419 | Ferrari et al. | Apr 2004 | A1 |
20040111516 | Cain | Jun 2004 | A1 |
20040187032 | Gels et al. | Sep 2004 | A1 |
20040199616 | Karhu | Oct 2004 | A1 |
20040199646 | Susai et al. | Oct 2004 | A1 |
20040202182 | Lund et al. | Oct 2004 | A1 |
20040210663 | Phillips et al. | Oct 2004 | A1 |
20040213158 | Collett et al. | Oct 2004 | A1 |
20050009520 | Herrero et al. | Jan 2005 | A1 |
20050027862 | Nguyen et al. | Feb 2005 | A1 |
20050036501 | Chung et al. | Feb 2005 | A1 |
20050036511 | Baratakke et al. | Feb 2005 | A1 |
20050044270 | Grove et al. | Feb 2005 | A1 |
20050074013 | Hershey et al. | Apr 2005 | A1 |
20050080890 | Yang et al. | Apr 2005 | A1 |
20050102400 | Nakahara et al. | May 2005 | A1 |
20050125276 | Rusu | Jun 2005 | A1 |
20050163073 | Heller et al. | Jul 2005 | A1 |
20050198335 | Brown et al. | Sep 2005 | A1 |
20050240989 | Kim et al. | Oct 2005 | A1 |
20050249225 | Singhal | Nov 2005 | A1 |
20060023721 | Miyake et al. | Feb 2006 | A1 |
20060036733 | Fujimoto et al. | Feb 2006 | A1 |
20060069804 | Miyake et al. | Mar 2006 | A1 |
20060077926 | Rune | Apr 2006 | A1 |
20060098645 | Walkin | May 2006 | A1 |
20060168319 | Trossen | Jul 2006 | A1 |
20060187901 | Cortes et al. | Aug 2006 | A1 |
20060190997 | Mahajani et al. | Aug 2006 | A1 |
20060251057 | Kwon et al. | Nov 2006 | A1 |
20060277303 | Hegde et al. | Dec 2006 | A1 |
20060280121 | Matoba | Dec 2006 | A1 |
20070019543 | Wei et al. | Jan 2007 | A1 |
20070118881 | Mitchell et al. | May 2007 | A1 |
20070156919 | Potti et al. | Jul 2007 | A1 |
20070185998 | Touitou et al. | Aug 2007 | A1 |
20070195792 | Chen et al. | Aug 2007 | A1 |
20070259673 | Willars et al. | Nov 2007 | A1 |
20070283429 | Chen et al. | Dec 2007 | A1 |
20070286077 | Wu | Dec 2007 | A1 |
20070288247 | Mackay | Dec 2007 | A1 |
20070294209 | Strub et al. | Dec 2007 | A1 |
20080031263 | Ervin et al. | Feb 2008 | A1 |
20080101396 | Miyata | May 2008 | A1 |
20080109452 | Patterson | May 2008 | A1 |
20080109870 | Sherlock et al. | May 2008 | A1 |
20080134332 | Keohane et al. | Jun 2008 | A1 |
20080250099 | Shen et al. | Oct 2008 | A1 |
20080291911 | Lee et al. | Nov 2008 | A1 |
20090070470 | Bauman et al. | Mar 2009 | A1 |
20090092124 | Singhal et al. | Apr 2009 | A1 |
20090106830 | Maher | Apr 2009 | A1 |
20090138945 | Savchuk | May 2009 | A1 |
20090141634 | Rothstein et al. | Jun 2009 | A1 |
20090164614 | Christian et al. | Jun 2009 | A1 |
20090172093 | Matsubara | Jul 2009 | A1 |
20090222583 | Josefsberg et al. | Sep 2009 | A1 |
20090228547 | Miyaoka et al. | Sep 2009 | A1 |
20100008229 | Bi et al. | Jan 2010 | A1 |
20100061319 | Aso et al. | Mar 2010 | A1 |
20100064008 | Yan et al. | Mar 2010 | A1 |
20100083076 | Ushiyama | Apr 2010 | A1 |
20100094985 | Abu-Samaha et al. | Apr 2010 | A1 |
20100106833 | Banerjee et al. | Apr 2010 | A1 |
20100106854 | Kim et al. | Apr 2010 | A1 |
20100162378 | Jayawardena et al. | Jun 2010 | A1 |
20100210265 | Borzsei et al. | Aug 2010 | A1 |
20100217793 | Preiss | Aug 2010 | A1 |
20100223630 | Degenkolb et al. | Sep 2010 | A1 |
20100228819 | Wei | Sep 2010 | A1 |
20100235507 | Szeto et al. | Sep 2010 | A1 |
20100235880 | Chen et al. | Sep 2010 | A1 |
20100265824 | Chao et al. | Oct 2010 | A1 |
20100268814 | Cross et al. | Oct 2010 | A1 |
20100293296 | Hsu et al. | Nov 2010 | A1 |
20100312740 | Clemm et al. | Dec 2010 | A1 |
20100318631 | Shukla | Dec 2010 | A1 |
20100322252 | Suganthi et al. | Dec 2010 | A1 |
20100333101 | Pope et al. | Dec 2010 | A1 |
20110007652 | Bai | Jan 2011 | A1 |
20110023071 | Li et al. | Jan 2011 | A1 |
20110029599 | Pulleyn et al. | Feb 2011 | A1 |
20110032941 | Quach et al. | Feb 2011 | A1 |
20110040826 | Chadzelek et al. | Feb 2011 | A1 |
20110047294 | Singh et al. | Feb 2011 | A1 |
20110060831 | Ishii et al. | Mar 2011 | A1 |
20110093522 | Chen et al. | Apr 2011 | A1 |
20110110294 | Valluri et al. | May 2011 | A1 |
20110145324 | Reinart et al. | Jun 2011 | A1 |
20110153834 | Bharrat | Jun 2011 | A1 |
20110185073 | Jagadeeswaran et al. | Jul 2011 | A1 |
20110191773 | Pavel et al. | Aug 2011 | A1 |
20110196971 | Reguraman et al. | Aug 2011 | A1 |
20110276982 | Nakayama et al. | Nov 2011 | A1 |
20110289496 | Steer | Nov 2011 | A1 |
20110302256 | Sureshehandra et al. | Dec 2011 | A1 |
20110307541 | Walsh et al. | Dec 2011 | A1 |
20120030341 | Jensen et al. | Feb 2012 | A1 |
20120084419 | Kannan et al. | Apr 2012 | A1 |
20120144015 | Jalan et al. | Jun 2012 | A1 |
20120170548 | Rajagopalan et al. | Jul 2012 | A1 |
20120173759 | Agarwal et al. | Jul 2012 | A1 |
20120290727 | Tivig | Nov 2012 | A1 |
20120297046 | Raja et al. | Nov 2012 | A1 |
20130046876 | Narayana et al. | Feb 2013 | A1 |
20130100958 | Jalan et al. | Apr 2013 | A1 |
20130136139 | Zheng et al. | May 2013 | A1 |
20130166762 | Jalan et al. | Jun 2013 | A1 |
20130176854 | Chisu et al. | Jul 2013 | A1 |
20130198385 | Han et al. | Aug 2013 | A1 |
20140012972 | Han | Jan 2014 | A1 |
20140089500 | Sankar et al. | Mar 2014 | A1 |
20140164617 | Jalan et al. | Jun 2014 | A1 |
20140169168 | Jalan et al. | Jun 2014 | A1 |
20140207845 | Han et al. | Jul 2014 | A1 |
20140258536 | Chiong | Sep 2014 | A1 |
20140269728 | Jalan et al. | Sep 2014 | A1 |
20140330982 | Jalan et al. | Nov 2014 | A1 |
20150039671 | Jalan et al. | Feb 2015 | A1 |
Number | Date | Country |
---|---|---|
1449618 | Oct 2003 | CN |
1529460 | Sep 2004 | CN |
1575582 | Feb 2005 | CN |
1725702 | Jan 2006 | CN |
101094225 | Dec 2007 | CN |
101189598 | May 2008 | CN |
102546590 | Jul 2012 | CN |
102571742 | Jul 2012 | CN |
102577252 | Jul 2012 | CN |
102918801 | Feb 2013 | CN |
103533018 | Jan 2014 | CN |
103944954 | Jul 2014 | CN |
104040990 | Sep 2014 | CN |
104067569 | Sep 2014 | CN |
104106241 | Oct 2014 | CN |
104137491 | Nov 2014 | CN |
1209876 | May 2002 | EP |
1770915 | Apr 2007 | EP |
1885096 | Feb 2008 | EP |
2577910 | Apr 2013 | EP |
2622795 | Aug 2013 | EP |
2647174 | Oct 2013 | EP |
2760170 | Jul 2014 | EP |
2772026 | Sep 2014 | EP |
1182560 | Nov 2013 | HK |
1183569 | Dec 2013 | HK |
1183996 | Jan 2014 | HK |
1189438 | Jun 2014 | HK |
2013528330 | May 2011 | JP |
2014143686 | Aug 2014 | JP |
10-0830413 | May 2008 | KR |
0113228 | Feb 2001 | WO |
0114990 | Mar 2001 | WO |
03103237 | Dec 2003 | WO |
2008053954 | May 2008 | WO |
2011049770 | Apr 2011 | WO |
2011149796 | Dec 2011 | WO |
2012050747 | Apr 2012 | WO |
2012075237 | Jun 2012 | WO |
2013070391 | May 2013 | WO |
2013081952 | Jun 2013 | WO |
2013096019 | Jun 2013 | WO |
2013112492 | Aug 2013 | WO |
2014052099 | Apr 2014 | WO |
2014088741 | Jun 2014 | WO |
2014093829 | Jun 2014 | WO |
WO2014138483 | Sep 2014 | WO |
WO2014144837 | Sep 2014 | WO |
WO2014179753 | Nov 2014 | WO |
Entry |
---|
Spatscheck et al., “Optimizing TCP Forwarder Performance”, IEEE/ACM Transactions on Networking, vol. 8, No. 2, Apr. 2000. |
Kjaer et al. “Resource allocation and disturbance rejection in web servers using SLAs and virtualized servers”, IEEE Transactions on Network and Service Management, IEEE, US, vol. 6, No. 4, Dec. 1, 2009. |
Sharifian et al. “An approximation-based load-balancing algorithm with admission control for cluster web servers with dynamic workloads”, The Journal of Supercomputing, Kluwer Academic Publishers, BO, vol. 53, No. 3, Jul. 3, 2009. |
Cardellini et al., “Dynamic Load Balancing on Web-server Systems”, IEEE Internet Computing, vol. 3, No. 3, pp. 28-39, May-Jun. 1999. |
Hunt et al. NetDispatcher: A TCP Connection Router, IBM Research Report RC 20853 May 19, 1997. |
Number | Date | Country | |
---|---|---|---|
Parent | 13650179 | Oct 2012 | US |
Child | 13943642 | US | |
Parent | 12788339 | May 2010 | US |
Child | 13650179 | US | |
Parent | 11582613 | Oct 2006 | US |
Child | 12771491 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12771491 | Apr 2010 | US |
Child | 12788339 | US |