Information security – Access control or authentication – Network
Reexamination Certificate
2009-09-10
2011-10-11
Chen, Shin-Hon (Department: 2431)
Information security
Access control or authentication
Network
C709S220000, C709S225000, C709S245000, C709S250000, C370S395320, C370S389000, C370S392000
Reexamination Certificate
active
08037518
ABSTRACT:
Methods and associated systems for processing data are disclosed. A hashing function sequentially processes a hash key to generate a hash value. A policy management system processes packets according to defined policies.
REFERENCES:
patent: 6754662 (2004-06-01), Li
patent: 6820121 (2004-11-01), Callis et al.
patent: 6925085 (2005-08-01), Krishna et al.
patent: 7082102 (2006-07-01), Wright
patent: 7669234 (2010-02-01), Buer
patent: 2001/0042204 (2001-11-01), Blaker et al.
patent: 2002/0116527 (2002-08-01), Chen et al.
patent: 2004/0123220 (2004-06-01), Johnson et al.
patent: WO 01/05087 (2001-01-01), None
Office Action from European Application No. 03029793.1, dated Jul. 3, 2009, 7 pages.
European Search report for European Application No. 03029793.1, mailed Jul. 28, 2005, 2 pages.
Jun, E. et al., “A Novel Cache Architecture to Support Layer-Four Packet Classification at Memory Access Speeds,” INFOCOM 2000,Proceedings of the 19thAnnual Joint Conference of the IEEE Computer and Communication Societies,vol. 3, Tel Aviv, Mar. 26, 2000, pp. 1445-1454.
Jun, X. et al., “Cost Effective Flow Table Designs for High-Speed Routers: Architecture and Performance Evaluation,”IEEE Transactions on Computers51:9, Sep. 2002, pp. 1089-1099.
Ramakrishna, M.V. et al., “Efficient Hardware Hashing Functions for High Performance Computers,”IEEE Transactions on Computers46:12, Dec. 1997, pp. 1378-1381.
Carter, J.L. et al. “Universal Classes of Hash Functions,”J. of Computer and System Sciences,vol. 18, Academic Press, Inc., London, pp. 143-154.
Ramakrishna, M.V. et al., “Efficient Hardware Hashing Functions for High Performance Computers,”Technical Report Series, Dept. of Computer Science, RMIT University, Melbourne, Apr. 1996, pp. 1-29.
Ramakrishna, M.V., et al., “Perfect Hashing Functions for Hardware Applications,” Proceedings of the International Conference on Data Engineering, Kobe, Japan, Apr. 8-12, 1991,IEEE Computer Society Press,vol. CONF 7, Apr. 8, 1991, pp. 464-470 (XP010022765).
Broadcom Corporation
Chen Shin-Hon
Sterne Kessler Goldstein & Fox PLLC
LandOfFree
Data processing hash algorithm and policy management does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data processing hash algorithm and policy management, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data processing hash algorithm and policy management will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4282353