Abstract:
Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree comprises a first node having a first field bounds and a first set of rules of the plurality of rules, and a plurality of child nodes for the first node. Each child node has child field bounds based on an intersection of the first field bounds and the first set of rules, and each child node is assigned a respective subset of the first set of rules based on the respective child field bounds. The method further comprises receiving a first packet, identifying a first child node of the plurality of child nodes based on values for one or more fields of the first packet, and applying the respective subset of rules assigned to the first child node to the first packet.
Abstract:
The present invention relates to a method, computer program product and a device for detecting watermarks in digital data for the purpose of electronic copyright management system. The invention includes transforming the original as well as unwatermarked data. Thereafter, tagging the resultant components of the transformed data using a pair of rows and columns. Then, selecting significant components in the said transformed data, transforming the suspected watermarked data and tagging the components in the transformed data. Further, selecting the tagged components from the transformed suspected watermarked data corresponding to those selected as significant in the original transformed data, and comparing said two groups of selected significant components to detect the watermarks.
Abstract:
A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.
Abstract:
Apparatus and methods are provided for implementing a firewall in a network infrastructure component. A method comprises generating a search tree for a plurality of rules. The search tree comprises a first node having a first field bounds and a first set of rules of the plurality of rules, and a plurality of child nodes for the first node. Each child node has child field bounds based on an intersection of the first field bounds and the first set of rules, and each child node is assigned a respective subset of the first set of rules based on the respective child field bounds. The method further comprises receiving a first packet, identifying a first child node of the plurality of child nodes based on values for one or more fields of the first packet, and applying the respective subset of rules assigned to the first child node to the first packet.
Abstract:
A technique for synchronization of mobile device information in a wireless communication network includes associating 300 a mobile device (MD) to a first access point (AP). A next step includes transmitting 302 a roam notification message from the first AP to all APs in network. A next step includes associating 304 the MD to a second AP. A next step includes establishing 306 that the first and second APs are roaming neighbors. A next step includes building 308 a roaming neighbor list in the associated first and second APs for the MD, wherein the list includes those neighboring APs where the MD has been associated. A next step includes determining 310 that the MD is currently associated with an AP. A next step includes preemptively pushing 312 information about the MD to those APs in the list of the determined AP for synchronization.
Abstract:
A technique for synchronization of mobile device information in a wireless communication network includes associating 300 a mobile device (MD) to a first access point (AP). A next step includes transmitting 302 a roam notification message from the first AP to all APs in network. A next step includes associating 304 the MD to a second AP. A next step includes establishing 306 that the first and second APs are roaming neighbors. A next step includes building 308 a roaming neighbor list in the associated first and second APs for the MD, wherein the list includes those neighboring APs where the MD has been associated. A next step includes determining 310 that the MD is currently associated with an AP. A next step includes preemptively pushing 312 information about the MD to those APs in the list of the determined AP for synchronization.
Abstract:
A technique for distributed propagation of data in a wireless communication network includes providing 600 a unique host identifier for each peer network entity in the wireless communication network, each host identifier having a length of B bits. A next step includes requesting 602 data from peer network entities using a request having a host identifier of the requesting network entity. A next step includes, if a peer network entity is hosting the requested data, comparing 608 the host identifiers of the requesting network entity and the peer network entity receiving the request to determine a match. A next step includes responding 610 to the request if a match is determined.