Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_1d90dfbedc85df2bce501f8af10f5cc4 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L69-163 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1416 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-552 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1466 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-323 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-29 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-34 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L47-27 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1458 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L69-16 |
classificationIPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L12-56 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-55 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-30 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F15-173 |
filingDate |
2005-01-11-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_c870fad5aa9ec1a78626710e42f36e57 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_793d8d7f785931a0a5e4850579a3c50d http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_851a79e9419ab755aba693367268310a http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b8d7df3c277cf4680ba1e5fede146715 |
publicationDate |
2006-11-02-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
EP-1716488-A2 |
titleOfInvention |
Preventing network data injection attacks using duplicate-ack and reassembly gap approaches |
abstract |
Approaches for preventing TCP data injection attacks in packet-switched networks are disclosed. An ACK message or dummy segment is sent to verify the authenticity of the data in the re-assembly buffer, and to help discard spurious data faster. These approaches involve the sender in detection of spurious data, and make improved use of mechanisms for processing ACK messages that are native to typical TCP implementations. The latter approach may be implemented without modification of the sender's TCP implementation. Further, the receiver's TCP implementation maintains compatibility with RFC 793. |
priorityDate |
2004-01-16-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |