http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-1706955-A2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1d90dfbedc85df2bce501f8af10f5cc4
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L69-16
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-323
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-27
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-34
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-29
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L69-163
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1458
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416
classificationIPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L12-56
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F15-173
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
filingDate 2005-01-11-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_793d8d7f785931a0a5e4850579a3c50d
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_851a79e9419ab755aba693367268310a
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b8d7df3c277cf4680ba1e5fede146715
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c870fad5aa9ec1a78626710e42f36e57
publicationDate 2006-10-04-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber EP-1706955-A2
titleOfInvention Preventing network data injection attacks
abstract Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. A first approach provides for dropping received segments that carry ACK values smaller than the next unacknowledged sequence number expected minus the maximum window size. This approach helps keep spurious injected segments out of the TCP re-assembly buffer. In a second approach, heuristics are used to examine the sequence number of a newly arrived segment, and when the sequence number is the next expected, then the newly arrived segment is used and the contents of the re-assembly buffer are not considered. Further, if the data payload of the newly arrived segment overlaps in sequential order with segments already in the re-assembly buffer, the overlapped segments in the re-assembly buffer are considered spurious and are discarded. Thus, this approach helps remove spurious data from the re-assembly buffer if the first approach somehow fails to prevent the data from entering the re-assembly buffer.
priorityDate 2004-01-16-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID129468261
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID15074

Total number of triples: 28.