会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Range and elevation determining device
    • 范围和高度确定装置
    • US3688408A
    • 1972-09-05
    • US3688408D
    • 1971-02-19
    • JAMES P SMITHERWIN MICHELSON
    • SMITH JAMES PMICHELSON ERWIN
    • G01C3/04G01C3/00
    • G01C3/04
    • A range and elevation determining device serving in one form as a sight for direct fire gunnery. May be in the form of a stadimetric ranging and sight setting device that when adjusted by the gunner to frame a target automatically will dictate proper elevation of the gun muzzle to accommodate known trajectory and range characteristics of certain ammunition and will direct, upon firing the gun, the projectile thereof to a selected kill point on the target. A front sight is provided as a rotatable disk that is pivotally mounted on an upright support on the gun muzzle. It may be a ''''see-through'''' or transparent disk. This disk is provided about its axis with a spiraled framing area having curved marginal framing stadia or lines that gradually converge in the direction of disk rotation from point blank or near range toward the longest effective range of the gun on which it is mounted and the ammunition used therein. Framing of the height of the image of a distant target between these marginal stadia automatically will indicate range whether or not such data is readably provided on the device. Preferably the disk is provided with annularly spaced radial lines that are respectively identified by readable range markings. The spiraled framing area may be a slot in the disk. The disk may be a reticule that is rotatably mounted in image planes of optical instruments, such as binoculars, gunner''s telescopes and periscopes, and provided with suitable readable markings that inform one accurately of the range and elevation data.
    • 一种范围和仰角确定装置以一种形式服务,作为直接火炮的瞄准具。 可以是一种立体测距和瞄准器的形式,当枪手自动调整瞄准目标时,将决定枪口的正确高度,以适应某些弹药的已知轨迹和射程特征,并在射击枪时指示 ,将其投射到目标上选定的杀伤点。 前视镜设置为可旋转的盘,其可旋转地安装在枪口上的直立支架上。 它可能是“透视”或透明磁盘。 该盘围绕其轴线设置有具有弯曲的边缘框架状态的线性框架区​​域,或者线路从盘从空白点或近距离朝向其安装的枪的最长有效范围逐渐收敛,并且弹药 在其中使用。 自动地在这些边缘体育场之间远距离目标的图像的高度的框架将指示这种数据是否可读地提供在设备上的范围。 优选地,盘设置有分别由可读范围标记识别的环形间隔的径向线。 螺旋成帧区域可以是盘中的槽。 盘可以是可旋转地安装在诸如双筒望远镜,炮手望远镜和潜望镜的光学仪器的图像平面中的网状物,并且具有合适的可读标记,其精确地通知范围和高度数据。
    • 23. 发明授权
    • Determining whether a selected backup set satisfies a retention policy
    • 确定所选备份集是否满足保留策略
    • US08527479B2
    • 2013-09-03
    • US13333400
    • 2011-12-21
    • Surya K. GhattyJames P. SmithPeter B. SymondsWilliam R. Yonker
    • Surya K. GhattyJames P. SmithPeter B. SymondsWilliam R. Yonker
    • G06F7/00
    • G06F11/1469G06F11/1458
    • Provided are computer program product, system, and method for assessing a backup image comprising a backup of a source computer system to recover to a target computer system. A point-in-time backup image is selected from a plurality of backup images taken of an image on the source computer system, wherein the selected backup is to be applied to the target computer system. A determination is made from a plurality of retention policies applicable to files included in the source computer system a most restrictive retention policy. A determination is made as to whether the selected backup image satisfies the most restrictive retention policy. A retention status of the backup image is set based on whether the determined version of the selected backup satisfies the most restrictive retention policy. The retention status is presented for use in determining whether to use the selected backup image.
    • 提供了用于评估备份图像的计算机程序产品,系统和方法,其包括源计算机系统的备份以恢复到目标计算机系统。 从源计算机系统上的图像拍摄的多个备份图像中选择时间点备份图像,其中所选备份被应用于目标计算机系统。 从适用于包含在源计算机系统中的文件的多个保留​​策略确定最严格的保留策略。 确定所选择的备份图像是否满足最严格的保留策略。 基于所选备份的确定版本是否满足最严格的保留策略,设置备份映像的保留状态。 提供保留状态用于确定是否使用所选的备份映像。
    • 25. 发明申请
    • DATA RETENTION USING LOGICAL OBJECTS
    • 数据保留使用逻辑对象
    • US20120215742A1
    • 2012-08-23
    • US13458669
    • 2012-04-27
    • Matthew J. ANGLINAvishai H. HOCHBERGToby L. MAREKJames P. SMITH
    • Matthew J. ANGLINAvishai H. HOCHBERGToby L. MAREKJames P. SMITH
    • G06F17/30
    • G06F11/1448G06F11/1458
    • Various embodiments are provided for facilitation of data retention using logical objects. Following an operation creating a redundant copy of the data performed on a scheduled interval, a logical object containing a number of managed file versions, represented by a number of member objects for a recovery point, is created. The logical object is assigned a policy of a data retention policy construct associated with the recovery point. The logical object is adapted for reassignment between policies of the data retention policy construct associated with various recovery points. During the reassignment, the plurality of member objects representing the plurality of managed file versions are logically retained instead of performing a data copy operation to associate the plurality of managed file versions with another recovery point.
    • 提供了各种实施例,用于使用逻辑对象促进数据保留。 在创建在计划的间隔上执行的数据的冗余副本的操作之后,创建包含多个受管文件版本的逻辑对象,由恢复点的多个成员对象表示。 逻辑对象被分配与恢复点相关联的数据保留策略构造的策略。 逻辑对象适用于与各种恢复点相关联的数据保留策略构造的策略之间的重新分配。 在重新分配期间,表示多个管理文件版本的多个成员对象被逻辑地保留,而不是执行数据复制操作以将多个被管理文件版本与另一恢复点相关联。
    • 28. 发明申请
    • APPROACH FOR SECURING DISTRIBUTED DEDUPLICATION SOFTWARE
    • 分发分发软件的保护方法
    • US20110040732A1
    • 2011-02-17
    • US12541191
    • 2009-08-14
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • Matthew J. AnglinDavid M. CannonAvishai H. HochbergAlexei KojenovJames P. SmithMark L. Yakushev
    • G06F12/00G06F12/16G06F7/00
    • G06F11/1453G06F21/55G06F21/64
    • The various embodiments of the present invention include techniques for securing the use of data deduplication activities occurring in a source-deduplicating storage management system. These techniques are intended to prevent fake data backup, target data contamination, and data spoofing attacks initiated by a source. In one embodiment, one technique includes limiting chunk querying to authorized users. Another technique provides detection of attacks and unauthorized access to keys within the target system. Additional techniques include the combination of validating the existence of data from the source by validating the data chunk, validating a data sample of the data chunk, or validating a hash value of the data chunk. A further embodiment involves the use of policies to provide authorization levels for chunk sharing and linking within the target. These techniques separately and in combination provide a comprehensive strategy to avoid unauthorized access to data within the target storage system.
    • 本发明的各种实施例包括用于确保在源 - 重复数据删除存储管理系统中发生的重复数据删除活动的使用的技术。 这些技术旨在防止由源发起的假数据备份,目标数据污染和数据欺骗攻击。 在一个实施例中,一种技术包括限制对授权用户的块查询。 另一种技术提供对目标系统内的攻击和未授权访问密钥的检测。 附加技术包括通过验证数据块来验证来自源的数据的存在,验证数据块的数据样本或验证数据块的哈希值的组合。 进一步的实施例涉及使用策略来为目标内的块共享和链接提供授权级别。 这些技术分开并组合提供了一种全面的策略,以避免未经授权的访问目标存储系统中的数据。