会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Prioritizing tasks from virtual machines
    • 从虚拟机优先处理任务
    • US08424007B1
    • 2013-04-16
    • US12242685
    • 2008-09-30
    • Brian HernackiSourabh SatishWilliam E. Sobel
    • Brian HernackiSourabh SatishWilliam E. Sobel
    • G06F9/46
    • G06F9/4881G06F9/485G06F2209/503
    • A computer-implemented method for prioritizing virtual machine tasks may include receiving a request to perform a first task from a virtual machine. The request may include information relevant to determining a priority of the task. The method may include determining the priority of the task based on the information. The method may further include scheduling the first task based on the priority of the task. The method may include selecting the first task for execution based on the scheduling. The method may include notifying the virtual machine that the first task has been selected for execution. Various related methods, computer-readable media, and systems are also disclosed.
    • 用于对虚拟机任务进行优先级的计算机实现的方法可以包括从虚拟机接收执行第一任务的请求。 该请求可以包括与确定任务的优先级有关的信息。 该方法可以包括基于该信息确定任务的优先级。 该方法还可以包括基于任务的优先级调度第一任务。 该方法可以包括基于调度来选择用于执行的第一任务。 该方法可以包括通知虚拟机第一任务已经被选择用于执行。 还公开了各种相关方法,计算机可读介质和系统。
    • 43. 发明授权
    • Collection of confidential information dissemination statistics
    • 收集机密信息传播统计资料
    • US08214907B1
    • 2012-07-03
    • US12036773
    • 2008-02-25
    • William E. SobelShaun Cooley
    • William E. SobelShaun Cooley
    • G06F12/14
    • H04L63/1416G06F21/51G06F2221/2119
    • Client computers track visited websites and monitor confidential information transmitted to the visited websites. Upon subsequent identification of a website as malicious or compromised, it is determined whether the unsecure website was visited, and if so, whether any confidential information was exposed to the unsecure website. Clients compile statistical reports concerning confidential information transmitted to unsecure websites, and provide these reports to a central server. The central server uses statistical reports received from a wide distribution of clients to maintain comprehensive statistical data indicating exposure of confidential information to unsecure websites. This comprehensive statistical data can be used for purposes such as damage assessment, trend tracking and profiling of suspected malicious websites.
    • 客户端计算机跟踪访问的网站并监视发送到访问的网站的机密信息。 随后将网站识别为恶意或受到损害时,确定是否访问了不安全的网站,如果是,是否将隐私信息暴露给不安全的网站。 客户编制有关传递到不安全网站的机密信息的统计报告,并将这些报告提供给中央服务器。 中央服务器使用从广泛分布的客户端收到的统计报告,以维护全面的统计数据,表明将机密信息暴露给不安全的网站。 这种综合统计数据可用于损害评估,趋势跟踪和疑似恶意网站的分析等目的。
    • 44. 发明授权
    • Streaming distribution of file data based on predicted need
    • 根据预测需要流式传输文件数据
    • US08214839B1
    • 2012-07-03
    • US12059777
    • 2008-03-31
    • Shaun CooleyRandall Richards CookWilliam E. Sobel
    • Shaun CooleyRandall Richards CookWilliam E. Sobel
    • G06F13/00
    • H04L67/025G06F17/30132G06F17/30203H04L67/18
    • File resources that are most likely to be used on a target computer are proactively cached, so that the resources are available before they are needed. This greatly reduces or eliminates associated user wait times. It is determined which file resources are most likely to be used, the cost of transmitting them to the cache, the cost of storing them in the cache and the amount of cache space available. Based on a weighted balancing analysis of factors such as these, specific file resources are proactively streamed for use on the target computer. The determination as to which resources are most likely to be used can be based on a variety of factors, such as usage patterns, schedule based information, user and group based information, target computer and network information, etc.
    • 在目标计算机上最有可能使用的文件资源被主动缓存,以便资源在需要之前可用。 这大大减少或消除了相关联的用户等待时间。 确定哪些文件资源最有可能被使用,将它们发送到高速缓存的成本,将其存储在高速缓存中的成本以及可用的高速缓存空间量。 基于对这些因素的加权平衡分析,主动流式传输特定文件资源以在目标计算机上使用。 关于哪些资源最有可能被使用的决定可以基于各种因素,例如使用模式,基于时间表的信息,基于用户和组的信息,目标计算机和网络信息等。
    • 46. 发明授权
    • Global, location-aware computer security
    • 全球,位置感知计算机安全
    • US08131846B1
    • 2012-03-06
    • US12498288
    • 2009-07-06
    • Brian HernackiWilliam E. Sobel
    • Brian HernackiWilliam E. Sobel
    • G06F15/173
    • G06F21/552G06F21/577G06F2221/2111G06F2221/2149
    • Global, location-aware security information is generated, and used to provide location-aware computer security to portable computing devices. A global, location-aware security system receives local, location-aware security information from a large number of portable devices. The local information from each device comprises their locations at the times of detection of threat indicators. The global system transforms the received local information into global information, and maps detected threat indicators to specific locations. Each device monitors activity occurring thereon, detects threat indicators and current locations, and builds local information, which is periodically transmitted to the global system. When a device is activated or moved to a new location, it determines its current location, and requests global information concerning that location from the global system. The global system transmits global information, which the portable device uses to apply a location-based risk level policy to provide location-aware computer security.
    • 生成全球,位置感知安全信息,并用于为便携式计算设备提供位置感知计算机安全性。 全球的位置感知安全系统从大量便携式设备接收本地的位置感知安全信息。 每个设备的本地信息包括在检测到威胁指标时的位置。 全球系统将接收的本地信息转换为全球信息,并将检测到的威胁指标映射到特定位置。 每个设备监视其上发生的活动,检测威胁指示符和当前位置,并构建周期性地发送到全局系统的本地信息。 当设备激活或移动到新位置时,它会确定其当前位置,并从全局系统请求有关该位置的全局信息。 全球系统传输全球信息,便携式设备用于应用基于位置的风险级别策略,以提供位置感知计算机的安全性。
    • 47. 发明授权
    • System state rollback after modification failure
    • 修改失败后的系统状态回滚
    • US08104032B1
    • 2012-01-24
    • US12268959
    • 2008-11-11
    • William E. Sobel
    • William E. Sobel
    • G06F9/44
    • G06F9/44505
    • A rollback manager creates a restore point on a computer. The rollback manager stores a reboot indicator in non-revertible storage. The rollback manager monitors the reboot indicator to detect an unexpected reboot during deployment of a modification. The rollback manager configures the computer responsive to the reboot indicator. The rollback manager can roll back the system state, responsive to detecting a failed modification deployment. The rollback manager can deem the computer to be stable, responsive to detecting a successful modification deployment.
    • 回滚管理器在计算机上创建还原点。 回滚管理器将重启指示器存储在不可恢复存储中。 回滚管理器监视重新启动指示器,以在部署修改期间检测到意外重新启动。 回滚管理器根据重启指示器配置计算机。 响应于检测到失败的修改部署,回滚管理器可以回滚系统状态。 回滚管理器可以根据检测到成功的修改部署来认为计算机是稳定的。
    • 50. 发明授权
    • Simulating PXE booting for virtualized machines
    • 模拟虚拟机的PXE引导
    • US07979260B1
    • 2011-07-12
    • US12059817
    • 2008-03-31
    • William E. SobelBruce McCorkendale
    • William E. SobelBruce McCorkendale
    • G06F17/50
    • G06F9/4416H04L61/2015
    • The operating system agnostic PXE network booting environment is simulated, such that the VMs boot “virtually” from a network boot image, which is actually provided by the hypervisor. More specifically, the network traffic of VMs is filtered, and PXE requests are detected. Responsive to a detected PXE request, the hypervisor simulates the PXE server, and returns an invalid IP address to the VM for PXE communication. This invalid IP address is configured for only internal communication on a virtual network. The hypervisor intercepts PXE related communication sent by the VM to the invalid address, and returns expected PXE responses to the VM, including a boot image. This allows the hypervisor to provide, inspect and/or modify the boot time environment of VMs.
    • 模拟操作系统不可知的PXE网络引导环境,使得VM从虚拟机管理程序实际提供的网络引导映像“虚拟地”引导。 更具体地说,对VM的网络流量进行过滤,并检测PXE请求。 响应于检测到的PXE请求,虚拟机管理程序模拟PXE服务器,并将无效的IP地址返回给VM进行PXE通信。 该无效IP地址仅配置在虚拟网络上的内部通信。 虚拟机管理程序拦截由VM发送的PXE相关通信到无效地址,并将预期的PXE响应返回到VM,包括引导映像。 这允许管理程序提供,检查和/或修改虚拟机的引导时间环境。