H04L12/2865

LAYER 3 ROUTING LOOP PREVENTION SYSTEM

A layer 3 routing loop prevention system includes a port extender coupled to a first and second control bridges by a LAG. The first and second control bridges are coupled by an interchassis link. When the first control bridge receives a packet and determines that its LAG link to the port extender is unavailable, it provides a control bridge failover identifier in the packet and performs layer 3 forwarding to send the packet to the second control bridge over the interchassis link. When the second control bridge receives the packet though the interchassis link and determines that its LAG link to the port extender is unavailable, that the packet includes the first control bridge failover identifier, and that layer 3 forwarding will result in the packet being sent back to the first control bridge device, the packet is dropped to prevent layer 3 routing loops.

System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
09560059 · 2017-01-31 · ·

A decryption scheme for recover of a decrypted object without a cryptographic key is described. First, logical operation(s) are conducted on data associated with a first data string expected at a first location within an object having the predetermined format and data within the encrypted object at the first location to recover data associated with a portion of a cryptographic key from the encrypted object. Thereafter, logical operation(s) are conducted on that data and a first portion of the encrypted object at a second location to produce a result. Responsive to the result including data associated with the plaintext version of the second data string, logical operation(s) are conducted on a second portion of the encrypted object and the data associated with the plaintext version of the second data string to recover data associated with the cryptographic key. Thereafter, the encrypted object may be decrypted using the cryptographic key.

METHODS AND SYSTEMS FOR TRANSMITTING AND RECEIVING DATA PACKETS THROUGH A BONDED CONNECTION

The present invention relates to methods and systems for transmitting and receiving data packets between a first network node and a second network node through a bonded connection. At the first network node, a data packet, a session identification of the data packet and a time value of the data packet are encapsulated in an encapsulating packet. The first network node sends the encapsulating packet from the first network node to the second network node through the bonded connection. The second network node then stores the encapsulating packet after receiving it and determines an expiration time of the encapsulating packet. When the expiration time of the encapsulating packet expired, the second network node dequeues the encapsulating packet and forwards the data packet according to destination of the data packet.

Synchronization of communication equipment

Apparatus and methods relating to synchronization of communication equipment are disclosed. Synchronization information received from a bonded communication link can be used to synchronize local and/or remote communication equipment, such as femtocell sites coupled to nodes in a ring network. This may involve isolating a frequency reference signal from a DSL (Digital Subscriber Line) communication link which is a constituent link of a bonded communication link, for example. In a ring network, received synchronization information could be used in synchronizing a locally connected installation of communication equipment, and passed for transmission in the ring network for synchronizing other communication equipment. Such dropping and passing of an analog frequency reference signal could be applied in networks having other topologies as well. At least some embodiments of the invention are applicable to optical links. One or more dedicated wavelengths of an optical link could be used to transfer a frequency reference signal, for example. Other functions, such as quality monitoring, quality reporting, and/or predictive traffic forwarding may be provided in some embodiments.

Local transparent extensibility and routing slip extensibility for business process execution language

In order to achieve location transparency and routing slip extensibility, a system and a method for orchestrating a web service using Business Process Execution Language are disclosed. The method includes: receiving a message, wherein the message comprises an address identifying an extension element; determining, from the address, a location of the extension element identified by the address; responsive to determining the location of the extension element, directing the message to an appropriate location; and storing the message in a computer readable storage medium.

Local Transparent Extensibility and Routing Slip Extensibility for Business Process Execution Language

In order to achieve location transparency and routing slip extensibility, a system and a method for orchestrating a web service using Business Process Execution Language are disclosed. The method includes: receiving a message, wherein the message comprises an address identifying an extension element; determining, from the address, a location of the extension element identified by the address; responsive to determining the location of the extension element, directing the message to an appropriate location; and storing the message in a computer readable storage medium.