会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Mapping computers and ports of power distribution units in a data center
    • 映射数据中心配电单元的计算机和端口
    • US09213380B2
    • 2015-12-15
    • US12135305
    • 2008-06-09
    • Justin P. BandholzWilliam J. PiazzaPhilip L. Weinstein
    • Justin P. BandholzWilliam J. PiazzaPhilip L. Weinstein
    • G06F1/26G06F1/00H04L9/32
    • G06F1/26G06F1/00H04L9/32
    • Mapping computers and ports of power distribution units in a data center, the data center including a plurality of computers and a data center management server, each computer in the data center connected for power to one of a plurality of power distribution unit (‘PDU’) ports of a PDU, each PDU connected through the communications module and a data communications network to the data center management server, including generating, by a power modulating module of a computer, a power consumption signal in the PDU, the power consumption signal encoding a unique identification of the computer; demodulating, by the PDU, the power consumption signal, including retrieving from the signal the unique identification of the computer; and reporting, by the PDU to the data center management server, an association of the unique identification of the computer and a PDU port.
    • 将数据中心的配电单元的计算机和端口映射到数据中心,数据中心包括多个计算机和数据中心管理服务器,数据中心中的每个计算机连接到多个配电单元(“PDU” )端口,通过通信模块连接的每个PDU和数据中心管理服务器的数据通信网络,包括由计算机的功率调制模块生成PDU中的功耗信号,功率消耗信号编码 电脑的独特识别; 通过PDU解调功耗信号,包括从信号中检索计算机的唯一标识; 并通过PDU向数据中心管理服务器报告计算机的唯一标识和PDU端口的关联。
    • 32. 发明授权
    • Methods and apparatuses for protecting data on mass storage devices
    • 保护大容量存储设备数据的方法和装置
    • US08756390B2
    • 2014-06-17
    • US11294230
    • 2005-12-05
    • Simon ChuWilliam J. Piazza
    • Simon ChuWilliam J. Piazza
    • G06F12/00G06F13/00
    • G06F21/80
    • Methods, apparatuses, and media to protect sensitive information in data storage devices are disclosed. Embodiments comprise a method of transmitting and receiving unique identification information of components of a computer system, comparing the information with previously saved information in the storage device, and not allowing access to the data if the information is substantially different. In some embodiments, the storage device may simply prevent access to the information. In other embodiments, the storage device may erase the information after detecting a change in the computer system. In other embodiments, the storage device may provide various options for effectively resetting the unique identification stored in the data storage device so that the device may be used in an altered system.
    • 公开了用于保护数据存储设备中的敏感信息的方法,设备和媒体。 实施例包括发送和接收计算机系统的组件的唯一标识信息的方法,将信息与先前保存的存储设备中的信息进行比较,并且如果信息显着不同,则不允许访问数据。 在一些实施例中,存储设备可以简单地阻止对信息的访问。 在其他实施例中,存储设备可以在检测到计算机系统中的改变之后擦除该信息。 在其他实施例中,存储设备可以提供用于有效地重置存储在数据存储设备中的唯一标识的各种选项,使得该设备可以在改变的系统中使用。
    • 33. 发明授权
    • Locating components in data center
    • 在数据中心定位组件
    • US08494370B2
    • 2013-07-23
    • US12857123
    • 2010-08-16
    • William J. Piazza
    • William J. Piazza
    • H04B10/00
    • H04B10/80
    • Embodiments of the invention include systems and method for determining the location of components in a data center. In one embodiment, a component locating system includes a lattice formed of interconnected hubs and rods. Each hub in the lattice computes its address relative to the address of a reference location, such as the location of an adjacent hub or of an origin hub defining the origin of a reference coordinate system. A plurality of optical transmitters is distributed along the lattice to transmit location information. Optical receivers mounted on top of the racks receive the location information and communicate the location information to rack-mounted components. The racks and rack-mounted components determine their locations from the location information and optionally transmit the location information to a central management server.
    • 本发明的实施例包括用于确定数据中心中的组件的位置的系统和方法。 在一个实施例中,部件定位系统包括由互连的轮毂和杆形成的格子。 格中的每个集线器计算其相对于参考位置的地址的地址,例如相邻集线器或定义参考坐标系原点的原点集线器的位置。 多个光发射器沿着晶格分布以发射位置信息。 安装在机架顶部的光接收器接收位置信息,并将位置信息传送到机架式组件。 机架和机架安装组件根据位置信息确定其位置,并可选地将位置信息发送到中央管理服务器。
    • 36. 发明申请
    • Specifying Associations among Attributes of Entities in
    • 指定实体属性之间的关联
    • US20080301279A1
    • 2008-12-04
    • US11755981
    • 2007-05-31
    • Thomas M. BreyRichard E. HarperWilliam J. Piazza
    • Thomas M. BreyRichard E. HarperWilliam J. Piazza
    • G06F15/173
    • G06F11/30H04L43/0817
    • Specifying associations among attributes of entities in a data center, the data center comprising a facility that houses computers and equipment supporting computer operations, the entities including the computers and the equipment, some attributes associated with a resource domain, the resource domain composed of a physical characteristic shared by some of the computers and equipment, including inducing, by a management module within the data center, a change in a value of a first attribute of a first entity; monitoring, by the management module within the data center, a change in a value of a second attribute of a second entity; determining whether the monitored change in the second attribute correlates with the induced change in the first attribute; and, if the monitored change in the second attribute correlates with the induced change in the first attribute, specifying an association among the first attribute, the second attribute, and the resource domain.
    • 指定数据中心中实体的属性之间的关联,数据中心包括容纳计算机和支持计算机操作的设备的设施,包括计算机和设备的实体,与资源域相关联的一些属性,由物理 一些计算机和设备共享的特征,包括由数据中心内的管理模块引起第一实体的第一属性的值的改变; 由数据中心内的管理模块监视第二实体的第二属性的值的变化; 确定所述第二属性中所监视的改变是否与所述第一属性中所引起的变化相关; 并且如果所监视的第二属性的改变与所述第一属性中的诱导改变相关,则指定所述第一属性,所述第二属性和所述资源域之间的关联。
    • 37. 发明授权
    • Method, system, and computer program product for rack position determination using acoustics
    • 使用声学的机架位置确定方法,系统和计算机程序产品
    • US07460978B1
    • 2008-12-02
    • US11770322
    • 2007-06-28
    • Thomas M. BreyRichard E. HarperThomas D. Pahel, Jr.William J. Piazza
    • Thomas M. BreyRichard E. HarperThomas D. Pahel, Jr.William J. Piazza
    • G06F15/00
    • G06F3/002
    • Embodiments of the present invention address deficiencies of the art in respect to equipment position location in a data center and provide a novel and non-obvious method, system and computer program product for rack position determination using acoustics. In one embodiment of the invention, a method for rack position determination using acoustics can be provided. The method can include ultrasonically ranging a first target wall in a data center from a host rack enclosure to acquire range data for the first target wall and ultrasonically ranging a second target wall in the data center from the host rack enclosure to acquire range data for the second target wall. The method further can include translating the range data for the first target wall and second target wall into position coordinates for the host rack enclosure and forwarding the position coordinates to a system administrator for the data center over a coupled data communications network.
    • 本发明的实施例解决了在数据中心中的设备位置位置方面的缺点,并且提供了一种用于使用声学的机架位置确定的新颖且非显而易见的方法,系统和计算机程序产品。 在本发明的一个实施例中,可以提供使用声学的机架位置确定的方法。 该方法可以包括超声波测距数据中心中的第一目标墙,从主机架外壳获取第一目标墙的范围数据,并且从主机架外壳超声波测距数据中心的第二目标墙,以获取范围数据 第二个目标墙。 该方法还可以包括将第一目标壁和第二目标壁的范围数据转换成主机架机架的位置坐标,并且通过耦合的数据通信网络将位置坐标转发给数据中心的系统管理员。
    • 38. 发明申请
    • HEURISTIC MALWARE DETECTION
    • HEURISTIC MALWARE检测
    • US20080141371A1
    • 2008-06-12
    • US11609170
    • 2006-12-11
    • Thomas M. BradicichRichard E. HarperWilliam J. Piazza
    • Thomas M. BradicichRichard E. HarperWilliam J. Piazza
    • G06F11/00
    • G06F21/56G06F21/552
    • Embodiments of the present invention provide a method, system and computer program product for the heuristic malware detection. In one embodiment of the invention, a heuristic malware detection method can include merging a baseline inventory of file attributes for respective files from each client computing system in a community of client computing systems into a merged inventory. The method further can include receiving an updated inventory of file attributes in a current inventory survey from different ones of the client computing systems. Each received survey can be compared to the merged inventory, and in response to the comparison, a deviant pattern of file attribute changes can be detected in at least one survey for a corresponding client computing system. Thereafter, the deviant pattern can be classified as one of a benign event or a malware attack. Finally, malware removal can be requested in the corresponding client computing system if the deviant pattern is classified as a malware attack.
    • 本发明的实施例提供了一种用于启发式恶意软件检测的方法,系统和计算机程序产品。 在本发明的一个实施例中,启发式恶意软件检测方法可以包括将来自客户端计算系统社区中的每个客户端计算系统的相应文件的文件属性的基准库存合并成合并库存。 该方法还可以包括在来自不同的客户端计算系统的当前库存调查中接收文件属性的更新的库存。 每个接收到的调查可以与合并的库存进行比较,并且响应于比较,可以在针对相应的客户端计算系统的至少一个调查中检测到文件属性变化的错误模式。 此后,这种错误的模式可以被归类为良性事件或恶意软件攻击之一。 最后,如果异常模式被分类为恶意软件攻击,则可以在相应的客户端计算系统中请求恶意软件删除。
    • 40. 发明授权
    • Selective shadowing and paging in computer memory systems
    • 计算机内存系统中的选择性阴影和寻呼
    • US5603011A
    • 1997-02-11
    • US342402
    • 1994-11-18
    • William J. Piazza
    • William J. Piazza
    • G06F12/06G06F12/10G06F9/45G06F12/02
    • G06F12/0638
    • Principal data (e.g. frequently accessed data such as video BIOS program information and a principal font set) and secondary data (e.g. secondary font sets) are permanently stored in a slow memory device (e.g. EPROM). To improve performance, the principal data but not the secondary data is copied initially to a faster access memory device (shadow RAM). Translating logic associated with the latter device is initially configured to intercept memory requests, having addresses in a range preassigned to the EPROM, and redirect them to shadow RAM. However, in order to allow for access to the secondary data, the redirection function of the translating logic can be disabled and re-enabled, under control of programs running in an associated computer, so that requests in the preassigned address range are routed directly to the EPROM. When the translating logic is disabled, all of the EPROM becomes accessible including locations containing the principal data and locations containing the secondary data. When the translating logic is enabled, only the principal data in the shadow RAM is accessible. The disabling and re-enabling functions are implemented presently by means of unique function calls issuable to system BIOS by operating system, device driver and application programs. In the disclosed embodiment, the size of the principal data is that of a page block, shadow RAM stores the principal data page and only that page, and the capacity of EPROM is sufficient to store the two or more page blocks of (principal and secondary) data.
    • 主要数据(例如频繁访问的数据,例如视频BIOS程序信息和主要字体集)和辅助数据(例如辅助字体集)被永久存储在慢速存储器件(例如EPROM)中。 为了提高性能,主数据而不是辅助数据最初被复制到更快的访问存储器设备(影子RAM)。 与后一个设备相关联的翻译逻辑最初被配置为截取存储器请求,其具有预分配给EPROM的范围内的地址,并将其重定向到影子RAM。 然而,为了允许对辅助数据的访问,在相关联的计算机中运行的程序的控制下,转换逻辑的重定向功能可被禁用并重新启用,使得预分配的地址范围内的请求被直接路由到 EPROM。 当翻译逻辑被禁用时,所有EPROM变得可访问,包括包含主数据的位置和包含辅助数据的位置。 启用翻译逻辑时,只能访问影子RAM中的主体数据。 禁用和重新启用功能目前通过操作系统,设备驱动程序和应用程序的系统BIOS可发布的独特功能调用来实现。 在所公开的实施例中,主要数据的大小是页面块的大小,影子RAM存储主数据页面并且仅存储该页面,并且EPROM的容量足以存储两个或更多个页面块(主和副 )数据。