Information security – Access control or authentication – Network
Reexamination Certificate
2005-06-30
2009-11-24
Jung, David Y (Department: 2434)
Information security
Access control or authentication
Network
C726S011000, C726S003000
Reexamination Certificate
active
07624436
ABSTRACT:
Methods and apparatus for performing content inspection using multi-pattern packet content inspection mechanisms employing tagged values. Pattern data structures are employed to facilitate multi-pattern searches via corresponding string-search algorithm machines. The pattern data structures include tagged values defining search offsets and depths for corresponding search patterns. Incoming packets are classified to flows, and stored in corresponding flow queues. Flow table entries are used to identify the pattern data structure for a given flow. During content inspection, the algorithm machine employs the tagged values to effectively skip portions of a data stream up to the offset for each search pattern and to cease searching for a pattern upon reaching the depth for the pattern.
REFERENCES:
patent: 6144934 (2000-11-01), Stockwell et al.
patent: 6182228 (2001-01-01), Boden et al.
patent: 6631466 (2003-10-01), Chopra et al.
patent: 2004/0039940 (2004-02-01), Cox et al.
patent: WO 03/094418 (2003-11-01), None
On networking multithreaded processor design: hardware thread prioritization Doring, A.; Gabrani, M.; Micro-NanoMechatronics and Human Science, 2005 IEEE International Symposium on vol. 1, Dec. 30-30, 2003 pp. 520-523 Vol.
Architectural Support for Network Applications on Simultaneous MultiThreading Processors Yi, K.; Gaudiot, J.-L.; Parallel and Distributed Processing Symposium, 2007. IPDPS 2007. IEEE International Mar. 26-30, 2007 pp. 1-10.
Timed Petri net models of multithreaded multiprocessor architectures Govindarajan, R.; Suciu, F.; Zuberek, W.M.; Petri Nets and Performance Models, 1997., Proceedings of the Seventh International Workshop on Jun. 3-6, 1997 pp. 153-162.
Aho, Alfred V. et al., “Efficient String Matching: An Aid to Bibliographic Search,” Communication of the ACM, vol. 18, No. 6, pp. 333-340, Jun. 1975.
Boyer, Robert S. et al., “A Fast String Searching Algorithm,” Communication of the ACM, vol. 20, No. 10, pp. 762-772, Oct. 1977.
Wu, Sun et al., “A Fast Algorithm for Multi-Pattern Searching,” pp. 1-11, May 1994.
Tuck, Nathan et al., “Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection,” IEEE INFOCOM 2004.
Prof.Dr. Reinert, Knut, “Advanced Aspects in Sequence Analysis,” Sommersemester 2004, FU-Berlin.
Ho, JC, “Intrusion Detection Processor with Packet Content Matching,” pp. 1-29, Jun. 2, 2005.
Crochemore, Maxime et al., “Fast Practical Multi-Pattern Matching,” pp. 1-13.
Crochemore, Maxime et al., “Pattern Matching and Text Compression Algorithms,” pp. 1-44.
PCT/US2006/025758, PCT International Search Report and Written Opinion of the International Searching Authority, Nov. 20, 2006.
Balakrishnan Santosh
Ramakrishna Venkatraman
Blakely , Sokoloff, Taylor & Zafman LLP
Intel Corporation
Jung David Y
LandOfFree
Multi-pattern packet content inspection mechanisms employing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Multi-pattern packet content inspection mechanisms employing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Multi-pattern packet content inspection mechanisms employing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4084081