Information security – Access control or authentication – Network
Reexamination Certificate
2003-02-12
2010-02-23
Chen, Shin-Hon (Department: 2431)
Information security
Access control or authentication
Network
C709S220000, C709S225000, C709S245000, C709S250000, C370S395320, C370S389000, C370S392000
Reexamination Certificate
active
07669234
ABSTRACT:
Methods and associated systems for processing data are disclosed. A hashing function sequentially processes a hash key to generate a hash value. A policy management system processes packets according to defined policies.
REFERENCES:
patent: 6754662 (2004-06-01), Li
patent: 6925085 (2005-08-01), Krishna et al.
patent: 7082102 (2006-07-01), Wright
patent: 2001/0042204 (2001-11-01), Blaker et al.
patent: 2002/0116527 (2002-08-01), Chen et al.
patent: 2004/0123220 (2004-06-01), Johnson et al.
patent: WO 01/05087 (2001-01-01), None
European Search Report for Application No. EP 03029793 mailed on Jul. 28, 2005; search completed on Jul. 13, 2005, Berlin.
Jun, Ex et al. “A Novel Cache Architecture to Support Layer-Four.Packet Classification at Memory Access Speeds.” INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communication Societies. Proceedings. IEEE Tel Aviv, Israel, Mar. 26-30, 2000. IEEE vol. 3, Mar. 26, 2000, pp. 1445-1454 (XP010376081).
Jun, Xu et al. “Cost Effective Flow Table Designs for High-Speed Routers: Architecture and Performance Evaluation.” IEEE Transactions on Computers. IEEE, vol. 51, No. 9, Sep. 2002, pp. 1089-1099 (XP002335870).
Ramakrishna, M.V. et al. “Efficient Hardware Hashing Functions for High Performance Computers.” IEEE Transactions on Computers. IEEE, vol. 46, No. 12, Dec. 1997, pp. 1378-1381 (XP002335871).
Ramakrishna, M.V. et al. “Perfect Hashing Functions for Hardware Applications.” Proceedings of the International Conference on Data Engineering, Kobe, Japan, Apr. 8-12, 1991. IEEE Computer Society Press, vol. CONF 7, Apr. 8, 1991, pp. 464-470 (XP010022765).
Carter, J.L. et al. “Universal Classes of Hash Functions.” Journal of Computer and System Sciences, Academic Press, Inc., London: Great Britain, 1979, vol. 18, pp. 143-154 (XP000652858).
Ramakrishna, M.V. et al. “Efficient Hardware Hashing Design for High Performance Computers.” Technical Report Series, Department of Computer Science, RMIT University, Melbourne, Australia, Apr. 1996, pp. 1-29.
Office Action from European Application No. 03029793.1, dated Jul. 3, 2009, 7 pages.
Broadcom Corporation
Chen Shin-Hon
Sterne Kessler Goldstein & Fox P.L.L.C.
LandOfFree
Data processing hash algorithm and policy management does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data processing hash algorithm and policy management, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data processing hash algorithm and policy management will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4231727