Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

104 results about "Promiscuous mode" patented technology

In computer networking, promiscuous mode is a mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is specifically programmed to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a wired network or one being part of a wireless LAN. Interfaces are placed into promiscuous mode by software bridges often used with hardware virtualization.

System and method for network topology discovery

A system and method for discovering network topology by various switch training and probing methods. Segments are discovered by having computers enter a promiscuous mode and determining from packets sent to a selected computer which computers see which other computers in the network. From the segments, various switch interconnections are determined, by having different computers train switches as to a training address and seeing which computers receive probe packets sent to that training address from another computer. Various training and probing methods are described that locate intermediate segments, deep switches, switch interconnections, and edge and singleton cases. In one implementation, a master computer coordinates the other computers (and devices) in the network to send the training and probing packets, and report on received packets, in order to determine the network topology.
Owner:MICROSOFT TECH LICENSING LLC

Wireless channel switching method and device

ActiveCN103596228AAccurate channel quality assessmentImprove accuracyWireless communicationPromiscuous modeQuality assessment
The embodiment of the invention provides a wireless channel switching method and device. The method includes the steps that an AP sequentially scans a current working channel and a part of non-working channels for set durations in a promiscuous mode according to a preset period to acquire scanning information of the channels; response time of each channel is determined according to probe response messages in the scanning information and corresponding probe request messages sent by the AP in each set duration, and the determined channels with the response time being shorter than or equal to the set time are used as candidate channels; corresponding channel quality evaluation values are calculated according to retransmission message zone bits, node identification and the message transmission rate carried in data messages in the scanning information of the candidate channels, and the AP is switched to the candidate channels with the calculated channel quality evaluation values being larger than or equal to a preset threshold value. According to the wireless channel switching method and device, the AP scans the current working channel and the part of non-working channels in the promiscuous mode and can be switched to the channels with good channel quality, and switching accuracy is high.
Owner:RUIJIE NETWORKS CO LTD

System and Method for the Capture and Archival of Electronic Communications

A system and method for the capture and archival of electronic communication is disclosed. A network interface card in promiscuous mode connects the invention to an electronic communications network. Network packets are received on the network interface card and sent to a pseudo TCP/IP stack, which reconstructs the network packets into the original electronic message. The reconstructed electronic message is transferred to the traffic capture component in chunks until the entire message is captured. The traffic capture component forwards the electronic message to the message analysis component, which hashes, parses, analyzes and formats for storage the electronic message. The electronic message, in a structured format, is then sent to the storage manager component. The storage manager component selects a storage unit from the available network storage based on the message hash. The storage manager component then compresses, encrypts and writes the structured version of the electronic message to the selected storage unit. The message analysis component also writes Meta Data information and keywords from the electronic message to the index database. Once an electronic message is captured and archived, it can be later retrieved using the message query/retrieval component. To retrieve a previously archived electronic message, a user first sends a query specifying the messages desired to the message query/retrieval component using the user interface. The message query/retrieval component formats the query in SQL and runs it against the index database. The message query/retrieval component also sends the query to any other instances of the invention in the electronic communications network via the communications interface. The results of the query from the index database and the other c instances of the invention are combined, formatted for display and returned to the user via the user interface. From the query results, the user can select one or more archived electronic messages to be viewed by sending a list of messages to the message query/retrieval component using the user interface. The message query/retrieval component forwards this list to the storage manager component, which reads, decrypts and decompresses each message from the list in turn and writes the structured message formatted for display to a disk file. When complete, the storage manager component informs the message query/retrieval component, which in turn notifies the user via the user interface. The policy component is used to modify the behavior of the traffic capture, message analysis and message query/retrieval components. Within the traffic capture component, the policy is used to determine whether a particular electronic message is captured or not. Within the message analysis component, the policy is used to determine what type of message analysis to perform and what the storage attributes of the message should be. Within the message query/retrieval component the policy is used to determine whether a user can access the message archive and to filter the query results.
Owner:STOKES TERRY LEE

System and Method for the Capture and Archival of Electronic Communications

A system and method for the capture and archival of electronic communication is disclosed. A network interface card in promiscuous mode connects the invention to an electronic communications network. Network packets are received on the network interface card and sent to a pseudo TCP / IP stack, which reconstructs the network packets into the original electronic message. The reconstructed electronic message is transferred to the traffic capture component in chunks until the entire message is captured. The traffic capture component forwards the electronic message to the message analysis component, which hashes, parses, analyzes and formats for storage the electronic message. The electronic message, in a structured format, is then sent to the storage manager component. The storage manager component selects a storage unit from the available network storage based on the message hash. The storage manager component then compresses, encrypts and writes the structured version of the electronic message to the selected storage unit. The message analysis component also writes Meta Data information and keywords from the electronic message to the index database. Once an electronic message is captured and archived, it can be later retrieved using the message query / retrieval component. To retrieve a previously archived electronic message, a user first sends a query specifying the messages desired to the message query / retrieval component using the user interface. The message query / retrieval component formats the query in SQL and runs it against the index database. The message query / retrieval component also sends the query to any other instances of the invention in the electronic communications network via the communications interface. The results of the query from the index database and the other c instances of the invention are combined, formatted for display and returned to the user via the user interface. From the query results, the user can select one or more archived electronic messages to be viewed by sending a list of messages to the message query / retrieval component using the user interface. The message query / retrieval component forwards this list to the storage manager component, which reads, decrypts and decompresses each message from the list in turn and writes the structured message formatted for display to a disk file. When complete, the storage manager component informs the message query / retrieval component, which in turn notifies the user via the user interface. The policy component is used to modify the behavior of the traffic capture, message analysis and message query / retrieval components. Within the traffic capture component, the policy is used to determine whether a particular electronic message is captured or not. Within the message analysis component, the policy is used to determine what type of message analysis to perform and what the storage attributes of the message should be. Within the message query / retrieval component the policy is used to determine whether a user can access the message archive and to filter the query results.
Owner:STOKES TERRY LEE

Online bidirectional monitoring and analysis method of power system full channel based on promiscuous mode

InactiveCN101815017ARealize online monitoring analysisDoes not affect actual communicationData switching networksPrimary stationElectric power system
The invention discloses an online bidirectional monitoring and analysis method of a power system full channel based on the promiscuous mode, comprising the following steps: 1) setting a port of a switch in which the channel is located as a mirroring port and mirroring the received and transmitted data at other ports to the mirroring port; 2) connecting a computer network card in which online bidirectional monitoring and analysis software is located to the mirroring port of the prepositive switch; 3) the online bidirectional monitoring and analysis software setting the network card in the promiscuous mode and monitoring the received and transmitted messages on all the channels on the prepositive switch; 4) analyzing the source IP addresses and the destination IP addresses of the messages and distinguishing transmitting from the master station from transmitting from the plant station according to the source IP and the destination IP; and 5) interpreting and analyzing the monitored messages according to the corresponding protocols, wherein the switch is the prepositive switch or data acquisition switch. By the method, uplink and downlink simultaneous monitoring of all the special channels can be realized by only one computer with the network card and uplink and downlink online simultaneous monitoring of all the network channels can be realized.
Owner:NARI TECH CO LTD +1

System and method for testing transmission speeds of network interface cards in a computer

A method for testing transmission speeds of network interface cards (NICs) in a computer (1), the computer being installed with a first NIC (11) and a second NIC (12), the computer being further connected to a virtual NIC (21), the method includes the steps of: configuring / setting an internet protocol (IP) address of the first NIC and an IP address of the second NIC, and configuring an IP address of the virtual NIC and a message authentication code (MAC) address of the virtual NIC; setting the second NIC to a promiscuous mode; setting an NIC transmission speed benchmark; obtaining the IP address and the MAC address of the virtual NIC, and sending a predefined amount of successive data packets of a predetermined size to the virtual NIC via the first NIC according to the IP address and the MAC address of the virtual NIC; capturing the predefined amount of successive data packets of the predetermined size via the second NIC; clocking a time for capturing the predefined amount of successive data packets of the predetermined size via the second NIC; computing a transmission speed of the first NIC and the second NIC according to the time for capturing the predefined amount of successive data packets of the predetermined size; and comparing the transmission speed to the NIC transmission speed benchmark to determine whether the first NIC and the second NIC pass the test. A related system is also provided.
Owner:HON HAI PRECISION IND CO LTD

Virtualizing the operation of intelligent network interface circuitry

The present invention is in the field of virtualization of Network Interface Cards and Controllers (NIC) that connect to for example a host computer that can have multiple functions and OS's (referred to as guest functions and guest-OS's) running on it simultaneously and, in particular, relates to the virtualization of the operation of a single NIC such that it can be used simultaneously by multiple guests in such a manner that memory references due to the network traffic originating from and destined to a particular guest is kept separate from other network traffic, and that allows the Media Access Controller (MAC) within the NIC to operate such that it only accepts network packets that are destined to one of the guest-functions or guest-OS's, and the MAC is not required to operate in promiscuous mode where it accept all incoming packets in order to implement the virtualization features.
Owner:CHELSIO COMMUNICATIONS

Systems and methods for providing network security with zero network footprint

The present invention is directed to a system and method which essentially hides the protection device from the public network, while still allowing the device to perform security inspections. The system and method, in one embodiment, operates in the promiscuous mode and does not have a physical address that is identifiable to any internal or external device, and is thus not available for direct attacks. Using this approach, every data packet flowing into the protected system can be viewed and actions taken to protect the network while the device remains free of the threat of a direct attack.
Owner:TREND MICRO INC

An intelligent network distribution method for wifi equipment

The invention discloses a wifi equipment intelligent network distribution method, which comprises an intelligent terminal and wifi equipment in the same wifi environment, and is characterized in thatthe intelligent terminal is connected in wifi.The method comprises the following steps: S1, starting a hybrid mode of wifi equipment to monitor a wireless signal in a space; S2, enabling the intelligent terminal to send wifi frame data in a broadcast or unicast mode; S3, enabling the intelligent terminal to intercept data with a specified bit length each time according to the sending requirement;S4, enabling the wifi device to scan a channel and captures a data packet; S5, after receiving the data of the wifi frame, enabling the wifi equipment to analyze the data according to the sending format, obtain the password and the network name, connect to a router, and send the determination information to a designated port number in a broadcast form; meanwhile, the intelligent terminal receivesconfirmation information at the same port number; and S6, the intelligent terminal receives the broadcast information of the wifi device, and then the wifi device can be obtained. According to the intelligent network distribution method, the defects of more operation steps, long time and the like in the traditional hotspot network distribution process are avoided.
Owner:AUX AIR CONDITIONING LTD BY SHARE LTD

Network safety detection method and system

The invention discloses a network safety detection method and system. The method comprises steps that an intrusion detection system assembly is established, a network card is set by a security probeto be a promiscuous mode, the detection strategy for detecting attack and leak behaviors is received, protocol analysis of captured packets is carried out by the security probe, the captured packets are analyzed into a packet head and a pure load part of each layer such as a link layer, a network layer and a transmission layer, the packet head and the load are carefully examined to detect attack characteristics, and protocol and grammar analysis is further carried out. The method is advantaged in that the structure is scientific and reasonable, the method is safe and convenient to use, attackintrusion outside the network is found, various types of unsafe behaviors within the network are detected, various types of intrusion activities are responded, the entire system has good timeliness, adaptability, security, availability and scalability, and reliable protection is provided for security of an internal host of the LAN.
Owner:JINING MEDICAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products