会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 21. 发明授权
    • Hosting a network service on a cluster of servers using a single-address image
    • 使用单一地址映像在服务器集群上托管网络服务
    • US06470389B1
    • 2002-10-22
    • US08818989
    • 1997-03-14
    • Pi-Yu ChungOm P. DamaniYennun HuangChandra M. KintalaYi-Min Wang
    • Pi-Yu ChungOm P. DamaniYennun HuangChandra M. KintalaYi-Min Wang
    • G06F1516
    • H04L29/06G06F2209/462H04L29/12047H04L29/12292H04L29/12783H04L61/15H04L61/2069H04L61/35H04L67/1002H04L67/1023H04L67/1034H04L67/42H04L69/16
    • Methods and apparatus for hosting a network service on a cluster of servers, each including a primary and a secondary Internet Protocol (IP) address. A common cluster address is assigned as the secondary address to each of the servers in the cluster. The cluster address may be assigned in UNIX-based servers using an ifconfig alias option, and may be a ghost IP address that is not used as a primary address by any server in the cluster. Client requests directed to the cluster address are dispatched such that only one of the servers of the cluster responds to a given client request. The dispatching may use a routing-based technique, in which all client requests directed to the cluster address are routed to a dispatcher connected to the local network of the server cluster. The dispatcher then applies a hash function to the client IP address in order to select one of the servers to process the request. The dispatching may alternatively use a broadcast-based technique, in which a router broadcasts client requests having the cluster address to all of the servers of the cluster over a local network. The servers then each provide a filtering routine, which may involve comparing a server identifier with a hash value generated from a client address, in order to ensure that only one server responds to each request broadcast by the router.
    • 在服务器集群上托管网络服务的方法和装置,每个服务器包括主要和辅助因特网协议(IP)地址。 将通用群集地址分配给群集中的每个服务器的辅助地址。 可以使用ifconfig别名选项在基于UNIX的服务器中分配群集地址,并且可能是群集中的任何服务器未被用作主地址的ghost IP地址。 调度定向到集群地址的客户端请求,使得只有一个集群的服务器响应给定的客户端请求。 调度可以使用基于路由的技术,其中指向集群地址的所有客户端请求被路由到连接到服务器集群的本地网络的分派器。 调度员然后将哈希函数应用于客户端IP地址,以便选择其中一个服务器来处理该请求。 调度可以替代地使用基于广播的技术,其中路由器通过本地网络向群集的所有服务器广播具有簇地址的客户端请求。 然后,服务器每个提供过滤例程,其可以涉及将服务器标识符与从客户端地址生成的散列值进行比较,以便确保只有一个服务器响应路由器广播的每个请求。
    • 22. 发明授权
    • Checkpoint and restoration systems for execution control
    • 检查点和恢复系统进行执行控制
    • US6044475A
    • 2000-03-28
    • US981297
    • 1998-03-03
    • Pi-Yu ChungYennun HuangChandra KintalaKiem-Phong VoYi-Min Wang
    • Pi-Yu ChungYennun HuangChandra KintalaKiem-Phong VoYi-Min Wang
    • G06F11/14
    • G06F11/1438
    • A checkpoint and restoration system is disclosed to provide checkpoint and restoration techniques for user application processes which save the process state, including the volatile state and desired portions of the persistent state, during normal execution, and thereafter restore the saved state. A lazy checkpoint technique is disclosed which delays the taking of the persistent state checkpoint until an inconsistency between the checkpointed volatile state and a portion of the persistent state is about to occur. The disclosed checkpoint and restoration system allows a user or a user application process to specify selected portions of the persistent state to be excluded from a checkpoint. A selected portion of the pre-restoring process state, such as a return value argument, may be protected before restoring the user application process to a checkpointed state, so that the pre-restoration values of the protected state are retained following restoration of the checkpoint. The retained return value allows one or more segments of restoration code to be executed following a restoration and a normal execution mode to be distinguished from a restoration mode.
    • PCT No.PCT / US95 / 07660 Sec。 371日期1998年3月3日 102(e)1998年3月3日PCT提交1995年6月16日PCT公布。 出版物WO97 / 00477 日期1997年1月3日公开了一种检查点和恢复系统,用于为正常执行期间保存处理状态(包括易失性状态和持久状态的期望部分)的用户应用进程提供检查点和恢复技术,然后恢复保存状态 。 公开了一种延迟的检查点技术,其延迟持续状态检查点的获取,直到检查点的易失性状态和持续状态的一部分之间的不一致将要发生。 所公开的检查点和恢复系统允许用户或用户应用进程指定要从检查点排除的持久状态的所选部分。 在将用户应用进程恢复到检查点状态之前,可以保护预恢复过程状态的所选部分(诸如返回值参数),使得在恢复检查点之后保留保护状态的恢复前值 。 保留的返回值允许在恢复之后执行恢复代码的一个或多个段,并且将正常执行模式与恢复模式区分开。
    • 23. 发明授权
    • Method for deadlock recovery using consistent global checkpoints
    • 使用一致的全局检查点的死锁恢复方法
    • US5664088A
    • 1997-09-02
    • US565038
    • 1995-11-30
    • Alexander Borisovitch RomanovskyYi-Min Wang
    • Alexander Borisovitch RomanovskyYi-Min Wang
    • G06F11/14G06F11/16
    • G06F11/1438G06F11/1479
    • A method for deadlock recovery in a shared resource multiprocess message passing computer system. The processes executing in the computer system perform periodic local checkpoints and communicate via inter-process messages. Upon detection of a deadlock in the computer system, inter-process rollback dependency is analyzed in order to choose a resource to reclaim. The choice of a resource to reclaim is made such that a resource manager which manages the resource can be rolled back so as to reclaim the resource, and such that an application process which is waiting for the resource is not rolled back past the point at which deadlock was detected. Thus, upon system restart, the reclaimed resource can be provided to the waiting process, and the waiting process can execute past the deadlock point. In one embodiment, the recovery line is determined by selecting appropriate checkpoints from a resource manager process and an application process, and determining the most recent consistent global checkpoint which contains the selected checkpoints.
    • 一种用于共享资源多进程消息传递计算机系统中的死锁恢复的方法。 在计算机系统中执行的进程执行周期性本地检查点并通过进程间消息进行通信。 在检测到计算机系统中的死锁时,分析了进程间回滚依赖关系,以便选择资源进行回收。 进行回收资源的选择使得可以回滚管理资源的资源管理器以回收资源,并且使得正在等待资源的应用进程不会回滚到超过所述资源的点, 检测到死锁。 因此,在系统重新启动时,可以将回收资源提供给等待进程,等待进程可以执行超过死锁点。 在一个实施例中,通过从资源管理器进程和应用进程选择合适的检查点,并且确定包含所选择的检查点的最新的一致的全局检查点来确定恢复线。
    • 24. 发明授权
    • Systematic approach to uncover visual ambiguity vulnerabilities
    • 发现视觉模糊漏洞的系统方法
    • US08539585B2
    • 2013-09-17
    • US11768134
    • 2007-06-25
    • Shuo ChenRalf SasseJiahe Helen WangYi-Min Wang
    • Shuo ChenRalf SasseJiahe Helen WangYi-Min Wang
    • G06F21/00
    • G06F11/3608G06F21/577G06F21/83
    • To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
    • 为了实现端到端的安全性,如果图形用户界面(GUI)的完整性受到损害,则传统的机器对机器的安全措施是不够的。 GUI逻辑缺陷是由GUI实现中的逻辑缺陷引起的一类软件漏洞。 这里描述的发明是使用系统推理方法揭露这些缺陷的技术。 该技术的主要步骤包括:(1)将视觉不变量映射到程序不变; (2)对程序逻辑,用户动作和执行上下文进行正式建模,并系统地探索违反程序不变的可能性; (3)根据探索找到真正的欺骗攻击。
    • 25. 发明授权
    • Interactive web crawler
    • 互动式网页抓取工具
    • US08538949B2
    • 2013-09-17
    • US13163001
    • 2011-06-17
    • Chao LiuChao ZhaouYi-Min Wang
    • Chao LiuChao ZhaouYi-Min Wang
    • G06F17/30
    • G06F17/30887G06F3/0482G06F3/04842G06F17/30864
    • The claimed subject matter provides a system or method for web crawling hidden files. An exemplary method includes loading a web page with a browser agent, and executing any dynamic elements hosted on the web page using the browser agent to insert pre-determined values. A list of form controls may be retrieved from the web page using the browser agent, and the controls may be analyzed using a driver component. Form control values may be sent from the driver component to the browser agent, and an event may be submitted to the web page by the browser agent or scripted content may be run to trigger operations on the web page corresponding to the form control values. A URL may be generated for various form control values using a generalizer.
    • 所要求保护的主题提供用于网络爬行隐藏文件的系统或方法。 示例性方法包括使用浏览器代理加载网页,以及使用浏览器代理来执行托管在网页上的任何动态元素以插入预定值。 可以使用浏览器代理从网页检索表单控件的列表,并且可以使用驱动器组件来分析控件。 表单控制值可以从驱动器组件发送到浏览器代理,并且可以由浏览器代理将事件提交到网页,或者可以运行脚本内容来触发对应于表单控制值的网页上的操作。 可以使用泛化器为各种形式控制值生成URL。
    • 29. 发明申请
    • DETECTING USER-MODE ROOTKITS
    • 检测用户模式
    • US20110099632A1
    • 2011-04-28
    • US12983849
    • 2011-01-03
    • Douglas Reed BeckYi-Min Wang
    • Douglas Reed BeckYi-Min Wang
    • G06F11/00
    • H04L63/145G06F21/554G06F21/566G06F2221/2105
    • A method and system for determining whether resources of a computer system are being hidden is provided. The security system invokes a high-level function of user mode that is intercepted and filtered by the malware to identify resources. The security system also directly invokes a low-level function of kernel mode that is not intercepted and filtered by the malware to identify resources. After invoking the high-level function and the low-level function, the security system compares the identified resources. If the low-level function identified a resource that was not identified by the high-level function, then the security system may consider the resource to be hidden.
    • 提供了一种用于确定计算机系统的资源是否被隐藏的方法和系统。 安全系统调用被恶意软件拦截和过滤的用户模式的高级功能,以识别资源。 安全系统还直接调用内核模式的低级功能,不被恶意软件拦截和过滤,以识别资源。 调用高级功能和低级功能后,安全系统将比较所识别的资源。 如果低级功能识别出高级功能未识别的资源,则安全系统可以考虑资源被隐藏。
    • 30. 发明授权
    • Changed file identification, software conflict resolution and unwanted file removal
    • 更改文件识别,软件冲突解决和不需要的文件删除
    • US07765592B2
    • 2010-07-27
    • US10830334
    • 2004-04-22
    • Yi-Min WangAaron R. JohnsonDavid C. LaddRoussi A. RoussevChad E. Verbowski
    • Yi-Min WangAaron R. JohnsonDavid C. LaddRoussi A. RoussevChad E. Verbowski
    • G06F21/00G06F12/14
    • G06F9/44505G06F8/65
    • As computer programs grow more complex, extensible, and connected, it becomes increasingly difficult for users to understand what has changed on their machines and what impact those changes have. An embodiment of the invention is described via a software tool, called AskStrider, that answers those questions by correlating volatile process information with persistent-state context information and change history. AskStrider scans a system for active components, matches them against a change log to identify recently updated and hence more interesting state, and searches for context information to help users understand the changes. Several real-world cases are provided to demonstrate the effectiveness of using AskStrider to quickly identify the presence of unwanted software, to determine if a software patch is potentially breaking an application, and to detect lingering components left over from an unclean uninstallation.
    • 随着计算机程序变得越来越复杂,可扩展和连接,用户越来越难以了解机器上发生了什么变化,以及这些更改有什么影响。 通过称为AskStrider的软件工具来描述本发明的实施例,其通过将易失性进程信息与持久状态上下文信息和变化历史相关联来回答这些问题。 AskStrider扫描系统中的活动组件,将其与更改日志进行匹配,以识别最近更新并因此更有趣的状态,并搜索上下文信息以帮助用户了解更改。 提供了几个真实案例来证明使用AskStrider快速识别不需要的软件的存在,确定软件补丁是否潜在地破坏应用程序,以及检测从不洁净卸载中遗留的剩余部件的有效性。