会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Extensible software development services
    • 可扩展的软件开发服务
    • US08271964B2
    • 2012-09-18
    • US11131446
    • 2005-05-16
    • Benjamin G. ZornDavid R. Hanson
    • Benjamin G. ZornDavid R. Hanson
    • G06F9/45
    • G06F8/20
    • Described herein are methods and systems for providing software development services in a networked software development environment. For instance, instead of performing compilation on a stand-alone desktop computer, software development activities including, compilation are performed by a service provider in response to a general query from a client requester. Such a network desirably has a global view of the source files being processed by various software development tools associated therewith. This global view enables many interesting approaches including the ability to perform analysis and optimizations to the input files not specified by the client requester. Such anticipatory processing may be based on the history and pattern of previous requests and availability of software development tools that the client requester is not aware of, for instance. The service request is submitted to a software development service provider to get back a specified result and non-specified anticipatory results as one of many “hits” in a ranked order.
    • 这里描述了用于在联网的软件开发环境中提供软件开发服务的方法和系统。 例如,不是在独立的台式计算机上执行编译,而是由服务提供商响应来自客户机请求者的一般查询来执行包括编译的软件开发活动。 理想地,这样的网络具有由与其相关联的各种软件开发工具处理的源文件的全局视图。 这种全局视图可以实现许多有趣的方法,包括对未由客户机请求者指定的输入文件进行分析和优化的能力。 例如,这种预期处理可以基于先前请求的历史和模式以及客户端请求者不知道的软件开发工具的可用性。 将服务请求提交给软件开发服务提供商,以获得指定的结果和非指定的预期结果作为排序顺序的许多“命中”之一。
    • 13. 发明申请
    • Monitoring System for Heap Spraying Attacks
    • 堆喷射攻击监控系统
    • US20100205674A1
    • 2010-08-12
    • US12369018
    • 2009-02-11
    • Benjamin G. ZornBenjamin LivshitsParuj Ratanaworabhan
    • Benjamin G. ZornBenjamin LivshitsParuj Ratanaworabhan
    • G06F21/00
    • G06F21/552G06F21/556
    • A monitoring system may analyze system memory to determine a vulnerability statistic by identifying potential sleds within the memory, and creating a statistic that is a ratio of the amount of potential sleds per the total memory. In some cases, the statistic may be based on the number of instructions or bytes consumed by the sleds. The potential sleds may be determined by several different mechanisms, including abstract payload execution, polymorphic sled detection, sled surface area calculation, and other mechanisms. The monitoring system may be a multi-threaded operation that continually monitors system memory and analyzes recently changed objects in memory. When the vulnerability statistic rises above a certain level, the system may alert a user or administrator to a high vulnerability condition.
    • 监视系统可以通过识别存储器内的潜在滑轨来分析系统存储器以确定漏洞统计量,并且创建一个统计量,该统计量是每个总存储器的潜在滑雪量的比率。 在某些情况下,统计信息可以基于雪橇所消耗的指令数或字节数。 潜在的雪橇可以通过几种不同的机制来确定,包括抽象有效载荷执行,多态滑轨检测,滑车表面积计算和其他机制。 监视系统可以是连续监视系统存储器并分析最近在存储器中改变的对象的多线程操作。 当漏洞统计信息上升到某一水平以上时,系统可能会向用户或管理员发出警报,以提高漏洞状况。
    • 14. 发明申请
    • CRITICAL MEMORY
    • 关键记忆
    • US20080140957A1
    • 2008-06-12
    • US11608698
    • 2006-12-08
    • Karthik PattabiramanVinod K. GroverBenjamin G. Zorn
    • Karthik PattabiramanVinod K. GroverBenjamin G. Zorn
    • G06F12/02G06F12/16
    • G06F11/141G06F11/1438
    • Typical computer programs may incur costly memory errors that result in corrupted data. A new memory model is presented wherein it may be determined that certain data is critical and critical data may be stored and protected during computer application execution. Critical Memory allows that data determined to be critical may be stored and retrieved using functions enabled to increase the reliability of the data. Critical Memory presents a memory model where a subset of memory designated as critical memory may be used to store a subset of data deemed critical data. Probabilistic guarantees of data value consistency are provided by the employment of the new memory model. The memory model and functions presented are compatible with existing third-party libraries such that third-party libraries may be compatibly called from processes using critical memory.
    • 典型的计算机程序可能会导致导致数据损坏的昂贵的内存错误。 提出了一种新的存储器模型,其中可以确定某些数据是关键的,并且在计算机应用执行期间可以存储和保护关键数据。 关键内存允许确定为关键的数据可以使用启用的功能来存储和检索,以提高数据的可靠性。 关键存储器提供了一种存储器模型,其中指定为关键存储器的存储器的子集可以用于存储被认为是关键数据的数据子集。 通过使用新的内存模型提供数据价值一致性的概率保证。 所呈现的内存模型和功能与现有的第三方库兼容,使得可以使用关键内存从进程兼容地调用第三方库。
    • 15. 发明授权
    • Expedited techniques for generating string manipulation programs
    • 用于生成字符串操作程序的快速技术
    • US09552335B2
    • 2017-01-24
    • US13487266
    • 2012-06-04
    • Sumit GulwaniRishabh SinghDany RouhanaBenjamin G. ZornWeide Zhong
    • Sumit GulwaniRishabh SinghDany RouhanaBenjamin G. ZornWeide Zhong
    • G06F9/44G06F17/22G06F9/45
    • G06F17/22G06F8/30G06F8/427
    • A program creation system is described which generates sets of subprograms for respective input-output examples. The program creation system then groups the sets into partitions by performing an intersection operation. According to one aspect, the program creation system generates subprograms so as to exclude tokens that are not represented by the input strings of the input-output examples. According to another aspect, the program creation system first generates the subprograms without attempting to generate loop-type expressions. If this operation produces unsatisfactory results, the program creation system repeats its processing, this time including loop-type expressions. According to another aspect, the program creation system performs the grouping operation using an expedited graph-intersection operation. According to another aspect, the program creation system ranks programs (which are created based on the results of the grouping operation) based on the presence of preferred features found in the programs.
    • 描述了为相应的输入输出示例生成一组子程序的程序创建系统。 然后,程序创建系统通过执行交叉操作将集合分组成分区。 根据一个方面,程序创建系统生成子程序以排除未由输入 - 输出示例的输入字符串表示的令牌。 根据另一方面,程序创建系统首先生成子程序而不尝试生成循环类型表达式。 如果此操作产生不令人满意的结果,则程序创建系统重复其处理,此时包括循环类型表达式。 根据另一方面,程序创建系统使用加速的图形交叉操作来执行分组操作。 根据另一方面,程序创建系统基于在程序中发现的优选特征的存在来排列基于分组操作的结果创建的程序(其被创建)。
    • 16. 发明授权
    • Tolerating and detecting asymmetric races
    • 容忍和检测非对称种族
    • US07971248B2
    • 2011-06-28
    • US11839017
    • 2007-08-15
    • Rahul NagpalDarko KirovskiBenjamin G. Zorn
    • Rahul NagpalDarko KirovskiBenjamin G. Zorn
    • G06F11/00
    • G06F9/526
    • Detecting and/or tolerating races. Races occur due to malicious threads not respecting software locks. A method of detecting and/or correcting races includes making local copie(s) and reference copie(s) of shared data. Any read and write operations performed by a safe thread are caused to be performed on the local copie(s) during a critical section. The critical section defines a time frame which a variable lock is placed on shared data. Any read and write operations performed by malicious threads are allowed to be performed on the shared data during the critical section. The shared data, the local copie(s), and the reference copie(s) are compared to determine that a race has been detected. An indication can be output that a race has occurred or the race can be corrected.
    • 检测和/或容忍种族。 由于不遵守软件锁的恶意线程而发生竞赛。 检测和/或校正种族的方法包括制作共享数据的本地复本和参考文件。 在安全线程执行的任何读写操作都会导致在临界区域对本地复合机执行。 关键部分定义了将变量锁定在共享数据上的时间范围。 允许在关键部分对共享数据执行由恶意线程执行的任何读写操作。 比较共享数据,本地复本和参考文件,以确定已经检测到比赛。 可以输出发生比赛的指示或者可以纠正比赛。
    • 17. 发明授权
    • Protection of critical memory using replication
    • 使用复制保护关键内存
    • US07949841B2
    • 2011-05-24
    • US11608695
    • 2006-12-08
    • Karthik PattabiramanVinod K. GroverBenjamin G. Zorn
    • Karthik PattabiramanVinod K. GroverBenjamin G. Zorn
    • G06F12/00G06F13/00G06F13/28
    • G06F11/167G06F11/183
    • Typical computer programs may incur costly memory errors that result in corrupted data. A new memory model is presented wherein it may be determined that certain data is critical and critical data may be stored and protected during computer application execution. Critical Memory allows that data determined to be critical may be stored and retrieved using functions enabled to increase the reliability of the data. Functions are presented enabling allocation of redundant computer memory; functions are presented enabling consistently writing critical data to redundant locations; and functions are presented enabling reading critical data while ensuring that the data read is consistent with the most recent write of critical data and enabled to repair inconsistent data. The memory model and functions presented are designed to be compatible with existing third-party libraries.
    • 典型的计算机程序可能会导致导致数据损坏的昂贵的内存错误。 提出了一种新的存储器模型,其中可以确定某些数据是关键的,并且在计算机应用执行期间可以存储和保护关键数据。 关键内存允许确定为关键的数据可以使用启用的功能来存储和检索,以提高数据的可靠性。 提供功能,使冗余计算机存储器的分配; 提供功能,可以将关键数据始终写入冗余位置; 并提供了功能,可以读取关键数据,同时确保数据读取与最新的关键数据写入一致,并能够修复不一致的数据。 所提供的内存模型和功能旨在与现有的第三方库兼容。
    • 18. 发明授权
    • Computer programming language pronouns
    • 计算机编程语言代词
    • US06748585B2
    • 2004-06-08
    • US09725654
    • 2000-11-29
    • Todd A. ProebstingBenjamin G. Zorn
    • Todd A. ProebstingBenjamin G. Zorn
    • G06F945
    • G06F8/423
    • Programming language constructs called pronouns and referents, and a method, system, and apparatus for translating computer source code that contains the pronouns and referents. A referent is any semantic or syntactic construct in the source code (e.g., a statement, a portion of a statement, an expression, or a value) to which a pronoun refers. A pronoun is a programming-language defined source-code symbol or a sequence of symbols that refers to the referent. As a result, pronouns eliminate the need to define new names or macros for repeated program segments. When a translator encounters the pronoun in the source code, the translator searches the source code for the referent and substitutes the referent for the pronoun. Thus, by using pronouns and referents, the programmer can write programs faster and easier and eliminate program redundancy without losing readability.
    • 编程语言结构称为代名词和指称,以及用于翻译包含代词和参考文献的计算机源代码的方法,系统和装置。 指称是代词引用的源代码中的任何语义或句法结构(例如,语句,语句的一部分,表达式或值)。 代词是编程语言定义的源代码符号或引用对象的符号序列。 因此,代词消除了为重复的程序段定义新名称或宏的需要。 当翻译者在源代码中遇到代词时,翻译者将搜索源代码作为引用,并用代词代替引用。 因此,通过使用代词和指示,编程人员可以更快更容易地编写程序,消除程序冗余,而不会丢失可读性。