http://rdf.ncbi.nlm.nih.gov/pubchem/patent/EP-1716488-A2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1d90dfbedc85df2bce501f8af10f5cc4
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L69-163
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-552
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1466
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-323
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-29
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-34
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-27
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1458
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L69-16
classificationIPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L12-56
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-55
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F15-173
filingDate 2005-01-11-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c870fad5aa9ec1a78626710e42f36e57
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_793d8d7f785931a0a5e4850579a3c50d
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_851a79e9419ab755aba693367268310a
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b8d7df3c277cf4680ba1e5fede146715
publicationDate 2006-11-02-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber EP-1716488-A2
titleOfInvention Preventing network data injection attacks using duplicate-ack and reassembly gap approaches
abstract Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. An ACK message or dummy segment is sent to verify the authenticity of the data in the re-assembly buffer, and to help discard spurious data faster. These approaches involve the sender in detection of spurious data, and make improved use of mechanisms for processing ACK messages that are native to typical TCP implementations. The latter approach may be implemented without modification of the sender's TCP implementation. Further, the receiver's TCP implementation maintains compatibility with RFC 793.
priorityDate 2004-01-16-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID129468261
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID15074

Total number of triples: 31.