会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Network packet receiver with buffer logic for reassembling interleaved
data packets
    • 具有缓冲逻辑的网络分组接收器,用于重新组合交错数据分组
    • US5303302A
    • 1994-04-12
    • US900844
    • 1992-06-18
    • Michael Burrows
    • Michael Burrows
    • H04J3/06H04L12/56H04Q11/04H04L9/00H04J3/02
    • H04L49/3081H04J3/0632H04Q11/0478H04L2012/5615H04L2012/5616H04L2012/5647H04L2012/5652H04L2012/5682
    • A network controller receives encrypted data packets in the form of interleaved streams of cells, and stores the received cells in a buffer until the end of each packet is received, at which time the complete packet is decrypted, error checked, and then transmitted to a host computer. The network controller's buffer includes a data storage array in which data packets are stored as linked lists, and a packet directory having a entry for each data packet stored in the buffer. Each directory entry contains a pointer to the first and last location in the buffer where a corresponding data packet is stored, as well as status information for the data packet. When free space in the network controller's buffer falls below a specified threshold, the network controller transmits selected partial packets to the host computer without decrypting or error checking, and also stores in its packet directory entry for each transmitted partial packet a "partial transfer" status flag. Additional portions of the partial packets may be sent to the host computer with an indication of the packet to which they belong. Upon receiving the end of a data packet that was partially transferred to the host computer, the remainder of the data packet in the packet buffer is transmitted to the host computer, without decrypting or error checking the partial data packet. The host computer then transmits the complete packet through a loopback path in the network controller for decrypting and error checking.
    • 网络控制器以交织的小区流的形式接收加密的数据分组,并将接收到的小区存储在缓冲器中,直到接收到每个分组的结尾,此时完整分组被解密,错误检查,然后发送到 主机。 网络控制器的缓冲器包括数据分组作为链表存储的数据存储阵列,以及包含存储在缓冲器中的每个数据分组的条目的分组目录。 每个目录条目包含指向缓冲器中存储相应数据分组的第一个和最后一个位置的指针,以及数据分组的状态信息。 当网络控制器缓冲区中的可用空间低于指定的阈值时,网络控制器将所选择的部分数据包发送到主计算机,而不进行解密或错误检查,并且还将其每个发送的部分数据包的“目录条目”存储在“分组转移”状态 旗。 部分分组的附加部分可以被发送到主计算机,其中包含它们所属的分组的指示。 在接收到部分传送到主计算机的数据分组的结束时,分组缓冲器中的数据分组的剩余部分被发送到主计算机,而不对该部分数据分组进行解密或错误检查。 然后,主机通过网络控制器中的环回路径发送完整的分组,用于解密和错误检查。
    • 32. 发明授权
    • Access control subsystem and method for distributed computer system
using compound principals
    • 使用复合主体的分布式计算机系统的访问控制子系统和方法
    • US5173939A
    • 1992-12-22
    • US783361
    • 1991-10-28
    • Martin AbadiMichael BurrowsEdward P. Wobber
    • Martin AbadiMichael BurrowsEdward P. Wobber
    • G06F9/46
    • G06F9/468Y10S707/99939
    • A distributed computer system has a number of computers coupled thereto at distinct nodes and a naming service with a membership table that defines a list of assumptions concerning which principals in the system are stronger than other principals, and which roles adopted by principals are stronger than other roles. Each object in the system has an access control list (ACL) having a list of entries. Each entry is either a simple principal or a compound principal. The set of allowed compound principals is limited to a predefined set of allowed combinations of simple principals, roles, delegations and conjunctions in accordance with a defined hierarchical ordering of the conjunction, delegation and role portions of each compound principal. The assumptions in the membership table reduce the number of entries needed in an ACL by allowing an entry to state only the weakest principals and roles that are to be allowed access. The reference checking process, handled by a reference monitor found at each node of the distributed system, grants an access request if the requestor is stronger than any one of the entries in the access control list for the resource requested. Furthermore, one entry is stronger than another entry if for each of the conjuncts in the latter entry there is a stronger conjunct in the former. Additional rules used by the reference monitor during the reference checking process govern the processes of comparing conjuncts in a requestor principal with the conjuncts in an access control list entry and of using assumptions to compare the relative strengths of principals and roles.
    • 分布式计算机系统具有多个与不同节点耦合的计算机,以及具有会员表的命名服务,该成员表定义了系统中哪些主体比其他主体更强的假设列表,以及由主体采用的角色比其他主体更强 角色。 系统中的每个对象都具有一个具有条目列表的访问控制列表(ACL)。 每个条目都是简单的主体或复合主体。 允许的复合主体的集合被限制为根据每个复合主体的连接,委派和角色部分的定义的分级顺序的简单主体,角色,委托和连接的允许的组合的预定义集合。 成员资格表中的假设通过允许条目仅指定允许访问的最弱主体和角色来减少ACL中所需的条目数。 如果请求者比所请求的资源的访问控制列表中的任何一个条目更强,由在分布式系统的每个节点处发现的参考监视器处理的参考检查过程就会授予访问请求。 此外,如果对于前一个条目中的每个连词都有一个更强的连接,则一个条目比另一个条目更强。 引用检查过程中参考监视器使用的附加规则管理将请求方主体中的连接与访问控制列表条目中的连接进行比较的过程,以及使用假设来比较主体和角色的相对强度。
    • 34. 发明授权
    • Method and system for cooperatively backing up data on computers in a network
    • US07529834B1
    • 2009-05-05
    • US09668643
    • 2000-09-22
    • Andrew David BirrellMark David LillibridgeMichael BurrowsMichael Acheson Isard
    • Andrew David BirrellMark David LillibridgeMichael BurrowsMichael Acheson Isard
    • G06F15/173G06F15/16G06F11/00
    • G06F11/1464Y10S707/99953
    • A method for backing up data in a plurality of computers connected via a network. The method includes forming partnerships between the plurality of computers such that each computer in a partnership commits under agreements to help backup the data of its partners. The method further includes periodically verifying that previously backed up data is being retained by the computers committed to act as backup partners in accordance with the agreements. In another embodiment, the method provides a distributed cooperative backing up of data in a system that includes a loose confederation of computers connected via a network. In this embodiment the method includes selecting computers as potential backup partners from among the loose confederation of computers connected via the network based on predetermined criteria, and negotiating a reciprocal backup partnership agreement between the computers based on predetermined requirements, including backup requirements. Once the negotiations are complete and the agreements are made, the method proceeds to form partnerships between the computers. The computers become backup partners by agreeing to cooperatively provide backup services to each other so that a distributed cooperative backing up of data can be administered in the absence of central control. The method further includes periodically backing up data at the backup partners, where the data being backed up is encoded. The method also includes periodically verifying that previously backed up data is retained by the backup partners. Another aspect of the invention is a distributed cooperative backup system that includes a network and a loose confederation of computers connected via the network. A plurality of computers from among the loose confederation of computers is configured for distributed cooperative backing up of data and for functioning as backup partners. Each computer of the plurality of computers has a storage that can be used for providing reciprocal backup services. Each computer of the plurality of computers respectively also has a computer readable medium embodying computer program code configured to cause the computer to perform functions comparable to the method steps as described above.
    • 36. 发明授权
    • Memory bound functions for spam deterrence and the like
    • 用于垃圾邮件威慑的内存绑定功能等
    • US07149801B2
    • 2006-12-12
    • US10290879
    • 2002-11-08
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • G06F15/173H04K1/00
    • H04L63/126H04L51/12
    • A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. Such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, we identify moderately hard, memory bound functions that most recent computer systems will evaluate at about the same speed, and we explain how to use them for protecting against abuses.
    • 如果用户投入很少或没有成本,资源可能会被滥用。 例如,电子邮件滥用是猖獗的,因为发送电子邮件对发件人的成本可以忽略不计。 通过以中等昂贵的计算的形式引入人造成本,可能不鼓励这种滥用。 因此,电子邮件的发件人可能需要在电子邮件被接受之前几秒计算才能付款。 不幸的是,由于计算机系统之间的差异很大,对于具有高端系统的恶意用户来说,这种方法可能无效,对于具有低端系统的合法用户或者两者都是非常缓慢的。 从这个观察开始,我们确定了最近的计算机系统以相同的速度评估的适度硬的记忆绑定功能,我们解释如何使用它们来防止滥用。
    • 39. 发明授权
    • System and method for playing compressed audio data
    • 用于播放压缩音频数据的系统和方法
    • US06377530B1
    • 2002-04-23
    • US09249182
    • 1999-02-12
    • Michael Burrows
    • Michael Burrows
    • G11B390
    • G11B31/02G11B31/003
    • A portable audio player stores a large amount of compressed audio data on an internal disk drive, and loads a portion of this into an internal random access memory (RAM) which requires less power and less time to access. The audio player plays the data stored in RAM and monitors the amount of unplayed data. When the amount of unplayed data falls below a threshold, additional data is copied from the disk drive into RAM. When the portable audio player is turned off, a predetermined amount of audio data is stored in a fast-access non-volatile flash memory unit. When the audio player is turned back on, and play is resumed, a suitable portion of this data can be played while data is being loaded from the disk drive into RAM, thus reducing the amount of time a user must wait before receiving data in response to a play request.
    • 便携式音频播放器将大量的压缩音频数据存储在内部磁盘驱动器上,并将其一部分加载到需要更少功率和更少访问时间的内部随机存取存储器(RAM)中。 音频播放器播放存储在RAM中的数据,并监视未播放数据的数量。 当未播放数据量低于阈值时,附加数据将从磁盘驱动器复制到RAM中。 当便携式音频播放器关闭时,预定量的音频数据被存储在快速访问非易失性闪存单元中。 当音频播放器被重新打开并且播放被恢复时,可以在将数据从磁盘驱动器加载到RAM中的同时播放该数据的适当部分,从而减少用户在接收数据之前必须等待的时间量 播放请求。