会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • VEX—virtual extension framework
    • VEX虚拟扩展框架
    • US08327390B2
    • 2012-12-04
    • US12492045
    • 2009-06-25
    • Ulfar Us ErlingssonEdward P. WobberPaul BarhamThomas Roeder
    • Ulfar Us ErlingssonEdward P. WobberPaul BarhamThomas Roeder
    • G06F3/00
    • G06F9/4411G06F9/4401
    • Extensions to operating systems or software applications can be hosted in virtual environments to fault isolate the extension. A generic proxy extension invoked by a host process can coordinate the invocation of an appropriate extension in a virtual process that can provide the same support APIs as the host process. Furthermore, a user mode context can be provided to the extension in the virtual process through memory copying or page table modifications. In addition, the virtual process, especially a virtual operating system process running on a virtual machine, can be efficiently started by cloning a coherent state. A coherent state can be created when a virtual machine starts up, or when the computing device starts up and the appropriate parameters are observed and saved. Alternatively, the operating system can create a coherent state by believing there is an additional CPU during the boot process.
    • 操作系统或软件应用程序的扩展可以托管在虚拟环境中,以隔离扩展。 由主机进程调用的通用代理扩展可以协调在虚拟进程中调用适当的扩展,该虚拟进程可以提供与主机进程相同的支持API。 此外,可以通过存储器复制或页表修改在虚拟过程中向用户模式上下文提供。 此外,可以通过克隆一致的状态来有效地启动虚拟进程,特别是在虚拟机上运行的虚拟操作系统进程。 当虚拟机启动时,或者计算设备启动并且观察并保存适当的参数时,可以创建一致的状态。 或者,操作系统可以通过相信在引导过程中有额外的CPU来创建一致的状态。
    • 6. 发明申请
    • MULTIPLE FIDELITY LEVEL ITEM REPLICATION AND INTEGRATION
    • 多重FIDELITY水平项目的复制和整合
    • US20110016100A1
    • 2011-01-20
    • US12503871
    • 2009-07-16
    • Venugopalan RamasubramanianThomas L. RodehefferDouglas B. TerryKaushik VeeraraghavanEdward P. Wobber
    • Venugopalan RamasubramanianThomas L. RodehefferDouglas B. TerryKaushik VeeraraghavanEdward P. Wobber
    • G06F17/30
    • G06F16/1787G06F16/184
    • A distributed system synchronizes replica devices with respect to items that may be inserted, modified, or deleted by any of the replica devices. Replicas may synchronize with other replicas to learn about updates to items. Each replica device may include a high-fidelity replication platform and/or a low-fidelity replication platform. The low-fidelity replication platforms may synchronize low-fidelity versions of items among the replica devices, and the high-fidelity replication platforms may synchronize high-fidelity versions of items among the replica devices. Each replica device may include a fidelity manager that copies high-fidelity versions of items from the high-fidelity replication platform, generates low-fidelity versions of the items from the high-fidelity versions of the items, and adds the low-fidelity versions of the items to the low-fidelity replication platforms. The fidelity managers may further integrate changes made to low-fidelity versions of items into the corresponding high-fidelity versions of the items.
    • 分布式系统相对于可由任何复制设备插入,修改或删除的项目来同步复制设备。 副本可能与其他副本同步,以了解项目的更新。 每个复制设备可以包括高保真复制平台和/或低保真复制平台。 低保真复制平台可以在副本设备之间同步低保真版本的项目,并且高保真复制平台可以在副本设备之间同步高保真版本的项目。 每个复制设备可以包括保真管理器,其从高保真复制平台复制高保真版本的项目,从项目的高保真版本生成项目的低保真版本,并且添加低保真版本的 将项目提供给低保真复制平台。 保真经理可以进一步将对低保真版本的项目的更改集成到相应的高保真版本的项目中。
    • 9. 发明授权
    • Memory bound functions for spam deterrence and the like
    • 用于垃圾邮件威慑的内存绑定功能等
    • US07149801B2
    • 2006-12-12
    • US10290879
    • 2002-11-08
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • Michael BurrowsMartin AbadiMark Steven ManasseEdward P. WobberDaniel Ron Simon
    • G06F15/173H04K1/00
    • H04L63/126H04L51/12
    • A resource may be abused if its users incur little or no cost. For example, e-mail abuse is rampant because sending an e-mail has negligible cost for the sender. Such abuse may be discouraged by introducing an artificial cost in the form of a moderately expensive computation. Thus, the sender of an e-mail might be required to pay by computing for a few seconds before the e-mail is accepted. Unfortunately, because of sharp disparities across computer systems, this approach may be ineffective against malicious users with high-end systems, prohibitively slow for legitimate users with low-end systems, or both. Starting from this observation, we identify moderately hard, memory bound functions that most recent computer systems will evaluate at about the same speed, and we explain how to use them for protecting against abuses.
    • 如果用户投入很少或没有成本,资源可能会被滥用。 例如,电子邮件滥用是猖獗的,因为发送电子邮件对发件人的成本可以忽略不计。 通过以中等昂贵的计算的形式引入人造成本,可能不鼓励这种滥用。 因此,电子邮件的发件人可能需要在电子邮件被接受之前几秒计算才能付款。 不幸的是,由于计算机系统之间的差异很大,对于具有高端系统的恶意用户来说,这种方法可能无效,对于具有低端系统的合法用户或者两者都是非常缓慢的。 从这个观察开始,我们确定了最近的计算机系统以相同的速度评估的适度硬的记忆绑定功能,我们解释如何使用它们来防止滥用。