US 20100220616 Optimizing network connections

US 20100220616 Optimizing network connections ABSTRACT – Embodiments of the invention provide methods and systems for optimizing network connections by a computing device. One or more network connections between a source and a destination may be monitored for one or more values of one or more connection parameters. Thereafter, one or more values of the connection parameters of the monitored network connections may be analyzed to select one or more combinations of the values. Further, the selected combinations of the values of the connection parameters may be stored. Subsequently, one or more monitored network connections may be established based on the stored values of the combinations. FIELD OF THE INVENTION The invention relates to network connections and more specifically the invention relates to optimization of network connections. BACKGROUND OF THE INVENTION Various users across the globe communicate or perform various activities on computer and device networks. Moreover, the users interact with…

US 8102863 High-speed WAN to wireless LAN gateway

US 8102863 High-speed WAN to wireless LAN gateway ABSTRACT – A gateway interconnecting a high speed Wide Area Network (WAN) and a lower speed Wireless Local Area Network (WLAN) is provided. The high speed WAN is preferably connected to the gateway via a Fiber-to-the Home (FTTH) connection and associated FTTH modem. In general, the gateway includes an adaptable cross-layer offload engine operating to manage bandwidth between the high speed WAN and the lower speed WLAN. As data enters the gateway from the WAN at the high speed data rate of the WAN, the offload engine stores the data in a non-secure data cache. A rule check engine performs a stateless or stateful inspection of the data in the non-secure data cache. Thereafter, the data is moved from the non-secure data cache to a secure data cache and thereafter transmitted to an appropriate user device in the WLAN at the lower data…

US 20120180059 DYNAMIC QoS TIME SENSITIVE FILE TRANSFER

US 20120180059 TIME-VALUE CURVES TO PROVIDE DYNAMIC QoS FOR TIME SENSITIVE FILE TRANSFERS ABSTRACT – A method and apparatus has been shown and described which allows Quality of Service to be controlled at a temporal granularity. Time-value curves, generated for each task, ensure that mission resources are utilized in a manner which optimizes mission performance. It should be noted, however, that although the present invention has shown and described the use of time-value curves as applied to mission workflow tasks, the present invention is not limited to this application; rather, it can be readily appreciated by one of skill in the art that time-value curves may be used to optimize the delivery of any resource to any consumer by taking into account the dynamic environment of the consumer and resource. FIELD OF THE INVENTION This invention relates generally to resource management and more particularly to a method and apparatus for…

US 20080040630 Dynamic QoS for Time Sensitive File Transfers

US 20080040630 Time-Value Curves to Provide Dynamic QoS for Time Sensitive File Transfers ABSTRACT – A method and apparatus has been shown and described which allows Quality of Service to be controlled at a temporal granularity. Time-value curves, generated for each task, ensure that mission resources are utilized in a manner which optimizes mission performance. It should be noted, however, that although the present invention has shown and described the use of time-value curves as applied to mission workflow tasks, the present invention is not limited to this application; rather, it can be readily appreciated by one of skill in the art that time-value curves may be used to optimize the delivery of any resource to any consumer by taking into account the dynamic environment of the consumer and resource FIELD OF THE INVENTION This invention relates generally to resource management and more particularly to a method and apparatus for generating…

US 8949846 Dynamic QoS for time sensitive file transfers

US 8949846 Time-value curves to provide dynamic QoS for time sensitive file transfers ABSTRACT – A method and apparatus has been shown and described which allows Quality of Service to be controlled at a temporal granularity. Time-value curves, generated for each task, ensure that mission resources are utilized in a manner which optimizes mission performance. It should be noted, however, that although the present invention has shown and described the use of time-value curves as applied to mission workflow tasks, the present invention is not limited to this application; rather, it can be readily appreciated by one of skill in the art that time-value curves may be used to optimize the delivery of any resource to any consumer by taking into account the dynamic environment of the consumer and resource. FIELD OF THE INVENTION This invention relates generally to resource management and more particularly to a method and apparatus for generating…

WO2007008976 Technique for authenticating network users

WO2007008976 Technique for authenticating network users ABSTRACT – A technique for authenticating network users is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for authenticating network users. The method may comprise receiving, from a client device, a request for connection to a network. The method may also comprise evaluating a security context associated with the requested connection. The method may further comprise assigning the client device one or more access privileges based at least in part on the evaluation of the security context. FIELD OF THE DISCLOSURE The present disclosure relates generally to network security and, more particularly, to a technique for authenticating network users. BACKGROUND OF THE DISCLOSURE To prevent unauthorized access, it is often necessary for a network to authenticate its users to ensure that each user is who he or she claims to be. Conventional user authentication methods typically involve a brief…

US 20070169171 Technique for authenticating network users

US 20070169171 Technique for authenticating network users ABSTRACT – A technique for authenticating network users is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for authenticating network users. The method may comprise receiving, from a client device, a request for connection to a network. The method may also comprise evaluating a security context associated with the requested connection. The method may further comprise assigning the client device one or more access privileges based at least in part on the evaluation of the security context. FIELD OF THE DISCLOSURE The present disclosure relates generally to network security and, more particularly, to a technique for authenticating network users. BACKGROUND OF THE DISCLOSURE To prevent unauthorized access, it is often necessary for a network to authenticate its users to ensure that each user is who he or she claims to be. Conventional user authentication methods typically involve a…

EP 1905211 Technique for authenticating network users

EP 1905211 Technique for authenticating network users ABSTRACT – A technique for authenticating network users is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for authenticating network users. The method may comprise receiving, from a client device, a request for connection to a network. The method may also comprise evaluating a security context associated with the requested connection. The method may further comprise assigning the client device one or more access privileges based at least in part on the evaluation of the security context. FIELD OF THE DISCLOSURE The present disclosure relates generally to network security and, more particularly, to a technique for authenticating network users. BACKGROUND OF THE DISCLOSURE To prevent unauthorized access, it is often necessary for a network to authenticate its users to ensure that each user is who he or she claims to be. Conventional user authentication methods typically involve a…

US 7940652 Pseudowire protection using a standby pseudowire

US 7940652 Pseudowire protection using a standby pseudowire ABSTRACT – Providing protection to network traffic includes sending a Pseudowire protection configuration parameter for configuring a standby Pseudowire between a source node and a destination node, receiving a Pseudowire configuration acknowledgement indicating whether the Pseudowire protection configuration parameter has been accepted by the destination node, and in the event that the Pseudowire protection configuration parameter has been accepted by the destination node, using the standby Pseudowire, wherein the standby Pseudowire is configured based at least in part on the Pseudowire protection configuration parameter. BACKGROUND OF THE INVENTION In recent years, many networking and telecommunications carriers have deployed Pseudowires to carry Layer-2 (also known as the data link layer of the Open Systems Interconnection (OSI) Reference Model) traffic. A Pseudowire (PW) refers to an emulation of a native service over a network. Examples of the native service include Asynchronous Transfer Mode (ATM), Frame…

US 20060123481 Method and apparatus for network immunization

US 20060123481 Method and apparatus for network immunization ABSTRACT – Network elements that are configured to perform deep packet inspection may be dynamically updated with patterns associated with malicious code, so that malicious code may be detected and blocked at the network level. As new threats are identified by a security service, new patterns may be created for those threats, and the new patterns may then be passed out onto the network in real time. The real time availability of patterns enables filter rules derived from the patterns to be applied by the network elements so that malicious code may be filtered on the network before it reaches the end users. The filter rules may be derived by security software resident in the network elements or may be generated by a filter generation service configured to generate network element specific filter rules for those network elements that are to be implemented…