会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 17. 发明授权
    • Thread interception and analysis
    • 线程截取和分析
    • US07865777B2
    • 2011-01-04
    • US11932890
    • 2007-10-31
    • Chad VerbowskiBrad DanielsJohn DunaganShan LuRoussi RoussevJuhan LeeArunvijay Kumar
    • Chad VerbowskiBrad DanielsJohn DunaganShan LuRoussi RoussevJuhan LeeArunvijay Kumar
    • G06F11/00
    • G06F11/36G06F11/3466G06F11/3476G06F21/552G06F2221/2101
    • Apparatus and methods for intercepting and analyzing threads are disclosed. In one embodiment, a thread data recorder is configured to instrument one or more existing functions by modifying computer executable instructions in the functions to intercept threads calling the functions. In one possible implementation, the number of existing functions instrumented can be reduced by instrumenting choke point functions. The instrumented functions can also capture data associated with the threads as the threads execute at the function. This data can be saved to memory and compressed into logs. In one aspect, the data can be saved and/or compressed at a time when processor resources are being used at or below predetermined level. The captured data can be used to analyze a functioning of a computer system in which the threads were produced.
    • 公开了用于截取和分析线程的装置和方法。 在一个实施例中,线程数据记录器被配置为通过修改函数中的计算机可执行指令来调试一个或多个现有函数来截取调用函数的线程。 在一个可能的实现中,可以通过测量阻塞点功能来减少所调用的现有功能的数量。 当函数执行线程时,仪器函数还可以捕获与线程关联的数据。 该数据可以保存到内存并压缩成日志。 在一个方面,当处于或低于预定级别的处理器资源被使用时,可以保存和/或压缩数据。 捕获的数据可用于分析其中​​生成线程的计算机系统的功能。
    • 20. 发明申请
    • FINGERPRINTING EVENT LOGS FOR SYSTEM MANAGEMENT TROUBLESHOOTING
    • 指示事件日志用于系统管理故障排除
    • US20100223499A1
    • 2010-09-02
    • US12394451
    • 2009-02-27
    • Rina PanigrahyChad VerbowskiYinglian XieJunfeng YangDing Yuan
    • Rina PanigrahyChad VerbowskiYinglian XieJunfeng YangDing Yuan
    • G06F11/28G06F11/07G06F17/30
    • G06F11/079G06F11/0709G06F11/0715H04L41/16
    • A technique for automatically detecting and correcting configuration errors in a computing system. In a learning process, recurring event sequences, including e.g., registry access events, are identified from event logs, and corresponding rules are developed. In a detecting phase, the rules are applied to detected event sequences to identify violations and to recover from failures. Event sequences across multiple hosts can be analyzed. The recurring event sequences are identified efficiently by flattening a hierarchical sequence of the events such as is obtained from the Sequitur algorithm. A trie is generated from the recurring event sequences and edges of nodes of the trie are marked as rule edges or non-rule edges. A rule is formed from a set of nodes connected by rule edges. The rules can be updated as additional event sequences are analyzed. False positive suppression policies include a violation- consistency policy and an expected event disappearance policy.
    • 一种自动检测和纠正计算系统中配置错误的技术。 在学习过程中,从事件日志中识别循环事件序列,包括例如注册表访问事件,并且开发相应的规则。 在检测阶段,将规则应用于检测到的事件序列以识别违例行为并从故障中恢复。 可以分析多个主机的事件序列。 通过对诸如从Sequitur算法获得的事件的分层序列进行平坦化来有效地识别循环事件序列。 从循环事件序列生成特里(trie),并将特里斯的节点的边缘标记为规则边缘或非规则边缘。 规则是由一组通过规则边连接的节点形成的。 当分析附加事件序列时,可以更新规则。 虚假的积极抑制政策包括违规行为政策和预期的事件消失政策。