Jack Y. Jau - Los Altos CA Zhong Wei Chen - San Jose CA
Assignee:
Hermes Microvision, Inc. - San Jose CA
International Classification:
G01N 2304
US Classification:
250311, 250310, 250306, 250307, 2504911
Abstract:
An apparatus and method for scanning the surface of a specimen is disclosed for defect inspection purposes. Scanning Electron Microscope (SEM) is used to scan the surface of a specimen. The scanning method employed by the SEM comprises the steps of: generating a particle beam from a particle beam emitter, and scanning the surface of the specimen by deflecting the particle beam at an angle with respect to the surface of the specimen, wherein the particle beam traverses an angle that is not parallel or perpendicular to the orientation of the specimen. The specimen being scanned is a semiconductor wafer or a photo mask.
Zhuangzhi Duo - Milpitas CA, US Zhong Chen - Fremont CA, US
Assignee:
SonicWALL, Inc. - Sunnyvale CA
International Classification:
H04B 7/00 H04L 12/26 H04L 12/56
US Classification:
3703102, 370229, 3702301, 370400, 455453
Abstract:
A centralized wireless LAN load balancing mechanism is described herein. In one embodiment, in response to a request for entering a wireless network from a wireless station and forwarded from multiple access points (APs) of the wireless network, a network access device coupled to the multiple APs determines a load for each of the APs. The network access device then selects one of the APs based on the determined loads of the APs and instructs the selected AP to associate with the wireless station. The network access device further instructs the remaining APs to reject the request. Other methods and apparatuses are also described.
Wireless Extender Secure Discovery And Provisioning
Zhuangzhi Duo - Fremont CA, US Zhong Chen - Fremont CA, US John Gmuender - Sunnyvale CA, US
Assignee:
Sonicwall, Inc. - San Jose CA
International Classification:
H04L 12/28
US Classification:
370401, 370338, 4554221
Abstract:
According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection.
Wireless Extender Secure Discovery And Provisioning
Zhuangzhi Duo - Fremont CA, US Zhong Chen - Fremont CA, US John Gmuender - Sunnyvale CA, US
Assignee:
SonicWALL, Inc. - San Jose CA
International Classification:
H04L 12/28
US Classification:
370401, 370338, 4554221
Abstract:
According to embodiments of the invention, a first wireless access point discovers a second wireless access point, the first wireless access point tunes its radio and privacy settings, without user input, based upon parameters automatically exchanged in response to the discovery of the second wireless access point, and a secure direct wireless connection is established between the first and second wireless access points using the radio and privacy settings. Adding the first wireless to an existing mesh network includes a determination of the best available direct wireless connection.
Mac Address Modification Of Otherwise Locally Bridged Client Devices To Provide Security
A method is disclosed for providing security to a client-to-client communication. The method includes authenticating a first client and a second client with an access point device, transmitting the packet to the security device and modifying a destination media access control (MAC) address of a packet from the first client to a MAC address of a security device for a first network. The packet contains a destination internet protocol (IP) address of the second client. The access point device and the first and second clients belong to the first network. The security device is located between the first network and a second network.
Methods Of Making Repetitive Sequences Removed Probes And Uses Thereof
Joe Lucas - San Ramon CA, US Zhong Chen - Sandy UT, US
International Classification:
C12Q001/68 C12P019/34
US Classification:
435006000, 435091200
Abstract:
The invention discloses novel methods and compositions for the detection of a target nucleic acid molecule in a sample. In particular, the invention provides a method of producing a probe having removed repetitive sequences comprising: (a) providing a source nucleic acid molecule containing repetitive sequences; (b) providing a driver nucleic acid molecule attached to a label and containing repetitive sequences that hybridize with the repetitive sequences of the source nucleic acid molecule; (c) hybridizing the source nucleic acid molecule and the driver nucleic acid molecule in the presence of a molecule that binds the label of step (b) wherein the repetitive sequences of source nucleic acid molecule hybridize with the repetitive sequences of the driver nucleic acid molecule to form a product; (d) subtracting the hybridized repetitive sequences of the product of step (c) by extraction with a protein dissolving solution to remove the hybridized repetitive sequences from the product; and (e) recovering the probe having repetitive sequences removed therefrom.
Systems And Methods For Content Type Classification
Shaohong Wei - Sunnyvale CA, US Zhong Qiang Chen - Sunnyvale CA, US Ping Ng - Milpitas CA, US Gang Duan - San Jose CA, US
Assignee:
Fortinet, Inc. - Sunnyvale CA
International Classification:
H04L 29/06
US Classification:
370241
Abstract:
Various embodiments illustrated and described herein include systems, methods and software for content type classification. Some such embodiments include determining a potential state of classification for packets associated with a session based at least in part on a packet associated with the session that is a packet other than the first packet of the session.
Systems And Methods For Detecting And Preventing Flooding Attacks In A Network Environment
Shaohong Wei - Sunnyvale CA, US Gang Duan - San Jose CA, US Zhong Qiang Chen - Sunnyvale CA, US Bing Xie - Beijing, CN
Assignee:
Fortinet, Inc. - Sunnyvale CA
International Classification:
H04L 29/06
US Classification:
726 23
Abstract:
A method for processing network traffic data includes receiving a packet, and determining whether the packet is a previously dropped packet that is being retransmitted. A method for processing network traffic content includes receiving a plurality of headers, the plurality of headers having respective first field values, and determining whether the first field values of the respective headers form a first prescribed pattern. A method for processing network traffic content includes receiving a plurality of packets, and determining an existence of a flooding attack without tracking each of the plurality of packets with a SYN bit.