Patent application number | Description | Published |
20130185698 | SIMPLIFYING ANALYSIS OF SOFTWARE CODE USED IN SOFTWARE SYSTEMS - An aspect of the present invention facilitates analysis of software code written in a programming language. In one embodiment, a visual interface designed to receive values identifying constructs of the programming language is provided on a display unit. In response to receiving, from a user using the visual interface, values corresponding to a construct of interest, a rule indicating a string of characters (that would constitute the construct of interest) is generated based on the received values. The generated rule is then applied to the software code to identify blocks matching the string of characters, each block representing a corresponding occurrence of the construct of interest in the software code. | 07-18-2013 |
20130263089 | GENERATING TEST CASES FOR FUNCTIONAL TESTING OF A SOFTWARE APPLICATION - An aspect of the present invention generates test cases for functional testing of a software application. In one embodiment, rules specifying corresponding patterns in a natural language and corresponding templates are maintained. Each pattern contains corresponding variables and words of the natural language together in an ordered sequence. On receiving a design document containing statements in the natural language, a first statement is determined to match a first pattern specified in a first rule. A match is deemed to exist only if the words in the first pattern exist in the first statement in the same corresponding positions of the ordered sequence, and if the first statement also contains values for each of the variables specified in the first pattern. A set of test cases is generated based on a first template specified in the first rule and the values for each of the variables. | 10-03-2013 |
20140310620 | DETERMINING FOREGROUND AND BACKGROUND COLOR COMBINATION FOR A USER INTERFACE ELEMENT IMPORTED FROM ANOTHER USER INTERFACE - An aspect of the present invention facilitates development of user interfaces of applications. In one embodiment, a user is enabled to select a user interface (UI) element from a source interface, the UI element being displayed using a source foreground color in a backdrop of a source background color in the source interface. Upon receiving a target background color forming a backdrop to the UI element in a target interface, a target foreground color is computed based on the target background color and a color difference between the source foreground color and the source background color. The selected UI element is then displayed in the target interface using the (computed) target foreground color and the (received) target background color. | 10-16-2014 |
Patent application number | Description | Published |
20120002670 | MULTIPLE CHASSIS STACKING USING FRONT END PORTS - A stacked chassis comprising multiple physical switch/router chassis operates without any special stacking hardware or stacking channels. Instead, a stacking LAG is installed between front-end switch ports on the stacked chassis. The chassis controllers negotiate a master, which controls operation of all chassis in the stack. A stacked-chassis-wide port numbering scheme is used to distribute information to all line cards in the system. Each line card processes the information to distill physical-chassis significant information for operation of that chassis in the stack. | 01-05-2012 |
20120020373 | PACKET FORWARDING USING MULTIPLE STACKED CHASSIS - A stacked chassis comprising multiple physical switch/router chassis operates without any special stacking hardware or stacking channels. Instead, a stacking LAG is installed between front-end switch ports on the stacked chassis. The chassis controllers negotiate a master, which controls operation of all chassis in the stack. A stacked-chassis-wide port numbering scheme is used to distribute information to all line cards in the system. Each line card processes the information to distill physical-chassis significant information for operation of that chassis in the stack. | 01-26-2012 |
20120039335 | MULTICAST PACKET FORWARDING USING MULTIPLE STACKED CHASSIS - A stacked chassis comprising multiple physical switch/router chassis operates without any special stacking hardware or stacking channels. Instead, a stacking LAG is installed between front-end switch ports on the stacked chassis. The chassis controllers negotiate a master, which controls operation of all chassis in the stack. A stacked-chassis-wide port numbering scheme is used to distribute information to all line cards in the system. Each line card processes the information to distill physical-chassis significant information for operation of that chassis in the stack. | 02-16-2012 |
20120063299 | HIGHLY AVAILABLE VIRTUAL PACKET NETWORK DEVICE - A virtual chassis includes two or more physical chassis and operates as a single, logical device. Each of the two or more physical chassis include two route processor modules (RPM) and each RPM is assigned a first and a second role within the virtual chassis. The first role is a physical chassis level role and the second role is a virtual chassis level role. The RPMs operate in coordination such that the failure of any one of the RPMs results in one or more other RPMs taking over the first and second roles of the failed RPM. | 03-15-2012 |
20120087372 | Link Aggregation Based on Port and Protocol Combination - A network switch suitable for receiving packets of information from and the packets of information to a communications network includes a plurality of physical ports, packet processing functionality and memory. The packet processing functionality operates on information stored in memory to determine the LAG, from among two or more LAGs, over which a packet received by the switch should be correctly forwarded. The switch memory stores a plurality of LAG tables, each one of which can include one or more entries comprising a physical port number and a packet parameter that are used by the packet processing functionality to determinately identify the correct LAG over which to forward a packet. | 04-12-2012 |
20120236859 | METHOD & APPARATUS FOR CONFIGURING A LINK AGGREGATION GROUP ON A STACKED SWITCH - Two network switches are configured in a stacked relationship to each other and include link aggregation sub-layer functionality. Switching tables are programmed on each switch with information used to forward packets ingressing to them over a redundant LAG that is identified in the switching table by a port that is a member of the redundant LAG. | 09-20-2012 |
20120320929 | PACKET FORWARDING USING MULTIPLE STACKED CHASSIS - A stacked chassis comprising multiple physical switch/router chassis operates without any special stacking hardware or stacking channels. Instead, a stacking LAG is installed between front-end switch ports on the stacked chassis. The chassis controllers negotiate a master, which controls operation of all chassis in the stack. A stacked-chassis-wide port numbering scheme is used to distribute information to all line cards in the system. Each line card processes the information to distill physical-chassis significant information for operation of that chassis in the stack. | 12-20-2012 |
20130083797 | Link Aggregation Based on Port and Protocol Combination - A network switch suitable for receiving packets of information from and the packets of information to a communications network includes a plurality of physical ports, packet processing functionality and memory. The packet processing functionality operates on information stored in memory to determine the LAG, from among two or more LAGs, over which a packet received by the switch should be correctly forwarded. The switch memory stores a plurality of LAG tables, each one of which can include one or more entries comprising a physical port number and a packet parameter that are used by the packet processing functionality to determinately identify the correct LAG over which to forward a packet. | 04-04-2013 |
Patent application number | Description | Published |
20130043111 | CIRCUIT BREAKER POSITION SENSING AND HEALTH MONITORING SYSTEM - A circuit breaker includes a breaker housing, a stationary contact, a movable contact, an operating shaft, and a linear position sensor. The stationary contact is non-movably mounted within the breaker housing, and the movable contact is movably mounted within the breaker housing. The movable contact is coupled to receive an input force and is configured, upon receipt of the input force, to move between a closed position, in which the movable contact is electrically coupled to the stationary contact, and an open position, in which the movable contact is electrically isolated from the stationary contact. The operating shaft is coupled to the movable contact to supply the input force thereto. The linear position sensor is connected to the operating shaft and is configured, upon movement of the operating shaft, to supply a position signal representative of movable contact position. | 02-21-2013 |
20130066587 | WIRELESS MAGNETIC POSITION SENSOR - In one example, a position sensor is provided. The position sensor comprises an integrated circuit, and a magnetic field sensor that provides a detected signal indicative of a position of a magnetic field source to the integrated circuit. The magnetic field sensor comprises a tunneling magnetoresistance (TMR) sensor. The position sensor further comprises a wireless circuit coupled to the integrated circuit, wherein the wireless circuit comprises an antenna configured to radiate a position signal based on the detected signal. | 03-14-2013 |
Patent application number | Description | Published |
20130291087 | SYSTEMS AND METHODS FOR INTEGRATING CLOUD SERVICES WITH INFORMATION MANAGEMENT SYSTEMS - A system includes an enterprise network including an internal management system communicatively coupled thereon, the enterprise network includes security and the internal management system is disposed behind the security; a cloud system external to the enterprise network and communicatively coupled to the enterprise network, at least one user associated with the enterprise network is configured to communicate through the cloud system for cloud-based services, and the cloud system is configured to log data associated with the at least one user for the cloud-based services; and an external service bridge located in the enterprise network behind the security, the external service bridge is configured to securely communicate with the cloud system to receive the log data and to communicate with the internal management system to provide the log data thereto. | 10-31-2013 |
20140026179 | DYNAMIC USER IDENTIFICATION AND POLICY ENFORCEMENT IN CLOUD-BASED SECURE WEB GATEWAYS - A cloud-based secure Web gateway, a cloud-based secure Web method, and a network deliver a secure Web gateway (SWG) as a cloud-based service to organizations and provide dynamic user identification and policy enforcement therein. As a cloud-based service, the SWG systems and methods provide scalability and capability of accommodating multiple organizations therein with proper isolation therebetween. There are two basic requirements for the cloud-based SWG: (i) Having some means of forwarding traffic from the organization or its users to the SWG nodes, and (ii) Being able to authenticate the organization and users for policy enforcement and access logging. The SWG systems and methods dynamically associate traffic to users regardless of the source (device, location, encryption, application type, etc.), and once traffic is tagged to a user/organization, various polices can be enforced and audit logs of user access can be maintained. | 01-23-2014 |
20150163199 | SYSTEMS AND METHODS FOR INTEGRATING CLOUD SERVICES WITH INFORMATION MANAGEMENT SYSTEMS - Systems and methods of integrating log data from a cloud system with an internal management system are described, wherein the cloud system is located externally from a secure network which contains the internal management system. The systems and methods include receiving log data from a cloud system through a secure connection between the secure network and the cloud system; buffering the received log data; filtering the buffered, received log data; and transmitting the filtered, buffered, received log data to the internal management system in a format associated with the internal management system. | 06-11-2015 |
Patent application number | Description | Published |
20110055381 | HOST INFORMATION COLLECTION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for collecting information of host devices. In one aspect, a method includes transmitting a plurality of information probes to the host device, including an agent probe that queries an agent installed on the host device for a unique agent identifier, monitoring for replies to the information probes from the host device during the host detection phase, ending the host detection phase in response to receiving a reply to the agent probe and that includes the unique agent identifier, resending the plurality of information probes and incrementing a repeat counter in response to not receiving a reply to the agent probe after the expiration of a time period and ending the host detection phase in response to a value of the repeat counter exceeding a maximum repeat value. | 03-03-2011 |
20110055382 | HOST ENTRY SYNCHRONIZATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, synchronizing records in peer devices. In one aspect, a method includes comparing, in a first peer device, a peer record received from a second peer device based on an IP address of the peer record from the second peer device and an IP address of a record stored in a host table of the first peer device. Unique agent identifiers, MAC addresses and time stamps are also compared to determine whether the peer record indicates a new host device, a new IP assignment to a known host device, or a new user logged into a known host device. | 03-03-2011 |
20110055383 | PROBE ELECTION IN FAILOVER CONFIGURATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating probing responsibilities between a primary sensor and a secondary sensor. In one aspect, a method includes determining a first probe type, the first probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the primary sensor, determining a second probe type, the second probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the secondary sensor, determining whether the second probe type is prioritized higher than the first probe type, and allocating probing responsibilities between the primary sensor and the second sensor based on the prioritization of the first probe type and the second probe type. | 03-03-2011 |
20110055580 | NONCE GENERATION - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for generating a nonce. In one aspect, a method includes generating, by a data processing apparatus, a source value, and hashing, by the data processing apparatus, the source value to generate the nonce. | 03-03-2011 |
20110055907 | HOST STATE MONITORING - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for a host state machine. In one aspect, the method includes defining a state machine in a memory of a data processing apparatus, the state machine comprising a plurality of states, and wherein network access for a host device is controlled in each state according to one or more network access zones associated with the state, each network access zone defining network access capabilities for the host device; monitoring, by the data processing apparatus, host devices attempting to access the network and host devices that have access to the network; and transitioning, for each host device, a state of the host based on the monitoring and a current state of the host. | 03-03-2011 |
20120144030 | Probe Election In Failover Configuration - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for allocating probing responsibilities between a primary sensor and a secondary sensor. In one aspect, a method includes determining a first probe type, the first probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the primary sensor, determining a second probe type, the second probe type being the probe type of the highest priority information probe for which a reply from the host device was received at the secondary sensor, determining whether the second probe type is prioritized higher than the first probe type, and allocating probing responsibilities between the primary sensor and the second sensor based on the prioritization of the first probe type and the second probe type. | 06-07-2012 |
20140075022 | Probe Election In Failover Configuration - A first sensor transmits one or more probes to a host device identified on a network, each probe used to obtain information regarding the host and the plurality of probes are prioritized according to probe type. A set of replies to the plurality of probes are received and it is determined that a first of the plurality of probes is the highest priority probe for which a reply from the host device was received. A second probe transmitted by a second sensor is identified as the highest priority probe for which a reply from the host device was received by the second sensor, where the first sensor is designated as a primary sensor and the second sensor is designated as a secondary sensor. Respective priorities of the probe types of the first and second probes are compared to determine whether to perform a probe handover to the second sensor. | 03-13-2014 |
20150121449 | AGENT ASSISTED MALICIOUS APPLICATION BLOCKING IN A NETWORK ENVIRONMENT - Embodiments are configured to receive metadata of a process intercepted on an end host when attempting to access a network. The metadata includes a hash of an application associated with the process and an endpoint reputation score of the application. Embodiments are configured to request a threat intelligence reputation score based on the hash of the application, to determine an action to be taken by the end host based, at least in part, on one or more policies and at least one of the threat intelligence reputation score and the endpoint reputation score, and to send a response indicating the action to be taken by the end host. Further embodiments request another threat intelligence reputation score based on another hash of a dynamic link library module loaded by the process on the end host, and the action is determined based, at least in part, on the other threat intelligence score. | 04-30-2015 |