会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • External environment sensitive predictive application and memory initiation
    • 外部环境敏感预测应用和记忆启动
    • US08706918B2
    • 2014-04-22
    • US13297173
    • 2011-11-15
    • Eric P. FriedWillaim B. Huber
    • Eric P. FriedWillaim B. Huber
    • G06F9/06
    • G06F3/038G06F1/1684G06F1/1694G06F3/011
    • An input tracker learns relationships between end user inputs made at a computer and external environment conditions sensed at the computer by external environment sensors integrated in the computer, such as a camera, microphone, hard disk drive motion detector, display ambient light sensor and display orientation accelerometer. An input predictor interfaced with the input tracker applies current external environment conditions sensed by the external environment sensors to the relationships defined by the input tracker to predict future user input and initiates actions by the computer responsive to the predicted future user input before the input is detected to have results responsive to the input prepared for the user upon detection of the input.
    • 输入跟踪器学习在计算机上进行的终端用户输入与计算机感测的外部环境条件之间的关系,该外部环境传感器集成在计算机中,例如相机,麦克风,硬盘驱动器运动检测器,显示器环境光传感器和显示方向 加速度计 与输入跟踪器接口的输入预测器将由外部环境传感器感测的当前外部环境条件应用于由输入跟踪器定义的关系,以预测将来的用户输入,并且在检测到输入之前响应于预测的未来用户输入启动计算机的动作 具有响应于在检测到输入时为用户准备的输入的结果。
    • 4. 发明授权
    • Multi-participant communication system with audio manager responsive to mode change requests
    • 具有响应于模式改变请求的音频管理器的多参与者通信系统
    • US08670556B2
    • 2014-03-11
    • US12830879
    • 2010-07-06
    • Eric P FriedPriyanka JadeSuresh SabarathinamSilpa Kosanam
    • Eric P FriedPriyanka JadeSuresh SabarathinamSilpa Kosanam
    • H04M1/00
    • H04M1/72519H04M3/42238H04M3/56
    • A communication system includes a local communication device that communicates with a remote communication device via a wired or wireless communication link between the devices. The local communication device and the remote communication device are each capable of switching between a multiple user mode and a single user private mode in response to a mode change request. The local and remote communication devices include respective profiles that include profile attributes that define how the respective communication device responds to a mode change request. A user of one communication device may send a mode change request to the other communication device. In response to the mode change request, the other communication device changes mode between multiple participant mode and single participant mode if the profile of that communication device permits the mode change.
    • 通信系统包括经由设备之间的有线或无线通信链路与远程通信设备进行通信的本地通信设备。 响应于模式改变请求,本地通信设备和远程通信设备都能够在多用户模式和单个用户专用模式之间切换。 本地和远程通信设备包括各自的配置文件,其包括定义各个通信设备如何响应于模式改变请求的配置文件属性。 一个通信设备的用户可以向另一个通信设备发送模式改变请求。 响应于模式改变请求,如果该通信设备的配置文件允许模式改变,则另一个通信设备在多个参与者模式和单个参与者模式之间改变模式。
    • 6. 发明授权
    • Method and apparatus for removing encrypted files unassociated with a user key from an archive
    • 用于从归档中去除与用户密钥无关的加密文件的方法和装置
    • US08140856B2
    • 2012-03-20
    • US11935743
    • 2007-11-06
    • Eric P. FriedRajeev MishraKonagalli N. RajeshSuresh Sabarathinam
    • Eric P. FriedRajeev MishraKonagalli N. RajeshSuresh Sabarathinam
    • G06F21/00
    • G06F21/6218G06F2221/0737G06F2221/2117G06F2221/2143
    • The present invention provides a computer implemented method, data processing system, and computer program product to selectively extracts compressed-encrypted files from an archive. The data processing system receives a command to preprocess the archive from an authenticated user, wherein the authenticated user is associated with at least one fingerprint. The data processing system determines that the at least one fingerprint fails to match all fingerprints in metadata of a first compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint fails to match all fingerprints, deletes the compressed-encrypted file. The data processing system determines that the fingerprint matches a second fingerprint in metadata of a second compressed-encrypted file in the archive. The data processing system, responsive to a determination that the fingerprint matches the second fingerprint, avoids deleting the second compressed-encrypted file.
    • 本发明提供了一种计算机实现的方法,数据处理系统和计算机程序产品,用于从归档中选择性地提取压缩加密的文件。 数据处理系统从认证的用户接收预处理归档的命令,其中认证的用户与至少一个指纹相关联。 所述数据处理系统确定所述至少一个指纹未能匹配所述存档中的第一压缩加密文件的元数据中的所有指纹。 数据处理系统响应于指纹未能匹配所有指纹的确定,删除压缩加密的文件。 数据处理系统确定指纹与存档中的第二压缩加密文件的元数据中的第二指纹匹配。 数据处理系统响应于指纹与第二指纹匹配的确定,避免删除第二压缩加密文件。
    • 8. 发明申请
    • SYMMETRIC MULTI-PROCESSOR LOCK TRACING
    • 对称多处理器锁定
    • US20110113406A1
    • 2011-05-12
    • US12616005
    • 2009-11-10
    • Diane G. FlemmingEric P. FriedGreg R. MewhinneyDavid B. Whitworth
    • Diane G. FlemmingEric P. FriedGreg R. MewhinneyDavid B. Whitworth
    • G06F9/44G06F9/30
    • G06F11/3636G06F11/3404G06F11/3409G06F11/3471G06F2201/865G06F2201/885
    • A symmetric multi-processor SMP system includes an SMP processor and operating system OS software that performs automatic SMP lock tracing analysis on an executing application program. System administrators, users or other entities initiate an automatic SMP lock tracing analysis. A particular thread of the executing application program requests and obtains a lock for a memory address pointer. A subsequent thread requests the same memory address pointer lock prior to the particular thread release of that lock. The subsequent thread begins to spin waiting for the release of that address pointer lock. When the subsequent thread reaches a predetermined maximum amount of wait time, MAXSPIN, a lock testing tool in the kernel of the OS detects the MAXSPIN condition. The OS performs a test to determine if the subsequent thread and address pointer lock meet the list of criteria set during initiation of the automatic lock trace method. The OS initiates an SMP lock trace capture automatically if all criteria or the arguments of the lock trace method are met. System administrators, software programmers, users or other entities interpret the results of the SMP lock tracing method that the OS stores in a trace table to determine performance improvements for the executing application program.
    • 对称多处理器SMP系统包括一个SMP处理器和操作系统OS软件,对执行的应用程序执行自动SMP锁跟踪分析。 系统管理员,用户或其他实体启动自动SMP锁跟踪分析。 执行应用程序的特定线程请求并获得用于存储器地址指针的锁。 随后的线程在该锁的特定线程释放之前请求相同的内存地址指针锁。 随后的线程开始旋转等待释放该地址指针锁。 当后续线程达到预定的最大等待时间时,MAXSPIN,OS内核中的锁定测试工具将检测MAXSPIN条件。 OS执行测试以确定后续线程和地址指针锁是否符合在启动自动锁定跟踪方法期间设置的条件列表。 如果符合锁跟踪方法的所有条件或参数,OS将自动启动SMP锁跟踪捕获。 系统管理员,软件程序员,用户或其他实体解释OS存储在跟踪表中的SMP锁跟踪方法的结果,以确定执行的应用程序的性能改进。
    • 9. 发明申请
    • Logically Partitioned System Having Subpartitions with Flexible Network Connectivity Configuration
    • 具有灵活网络连接配置的子分区的逻辑分区系统
    • US20100312868A1
    • 2010-12-09
    • US12478027
    • 2009-06-04
    • Ranadip DasEric P. FriedRajeev MishraSandeep R. Patil
    • Ranadip DasEric P. FriedRajeev MishraSandeep R. Patil
    • G06F15/173H04L12/28
    • G06F9/45558G06F2009/45595
    • A method of configuring a data processing system for facilitating network communications involves creating a primary logical partition (LPAR) in the data processing system, the LPAR configured to host a specified operating system. The method further includes creating a first virtual network adapter within the LPAR, associating the first virtual network adapter with a first network address, and binding the first virtual network adapter to the LPAR. The method additionally involves creating a first logical subpartition (LSPAR) within the LPAR, the first LSPAR configured to employ said specified operating system and no other. The method also includes creating a second virtual network adapter within the LPAR, associating the second virtual network adapter with a second network address, wherein the second network address is not an alias network address of the first network address, and binding the second virtual network adapter to the first LSPAR.
    • 配置用于促进网络通信的数据处理系统的方法包括在数据处理系统中创建主逻辑分区(LPAR),LPAR被配置为托管指定的操作系统。 该方法还包括在LPAR内创建第一虚拟网络适配器,将第一虚拟网络适配器与第一网络地址相关联,并将第一虚拟网络适配器绑定到LPAR。 该方法还涉及在LPAR内创建第一逻辑子分区(LSPAR),第一个LSPAR被配置为采用所述指定的操作系统,而不是其他的。 该方法还包括在LPAR内创建第二虚拟网络适配器,将第二虚拟网络适配器与第二网络地址相关联,其中第二网络地址不是第一网络地址的别名网络地址,并且绑定第二虚拟网络适配器 到第一个LSPAR。
    • 10. 发明申请
    • HOST TRUST REPORT BASED FILTERING MECHANISM IN A REVERSE FIREWALL
    • 在反向防火墙中基于托管信息报告的过滤机制
    • US20100162381A1
    • 2010-06-24
    • US12339542
    • 2008-12-19
    • Eric P. FriedAnand GoyalSilpa KosanamSuresh Sabarathinam
    • Eric P. FriedAnand GoyalSilpa KosanamSuresh Sabarathinam
    • G06F21/00
    • H04L63/02H04L63/0227
    • Disclosed is a computer implemented method and computer program product to throttle traffic from a source internet protocol address. The reverse firewall inspects payloads of a plurality of packets each packet having a source address identical to the source internet protocol address and a target address corresponding to a receiver host. Responsive to detecting purported good content within at least one of the plurality of packets, the reverse firewall forwards packets having the source address. The reverse firewall determines whether a count of packets having the source address exceeds a safe threshold. The reverse firewall requests a demanded positive trust report from the receiver host, responsive to a determination that the count of packets having the source address exceeds the safe threshold. The reverse firewall determines whether a positive trust report is received from the receiver host that indicates that the source internet protocol address is good. The reverse firewall analyzes a header of packet having the source address without analyzing a payload of the packet, responsive to a determination that the positive trust report is received from the receiver host.
    • 公开了一种计算机实现的方法和计算机程序产品,用于限制源互联网协议地址的流量。 逆向防火墙检查多个分组的有效载荷,每个分组具有与源互联网协议地址相同的源地址和对应于接收方主机的目标地址。 响应于在多个分组中的至少一个分组中检测到所述的良好内容,反向防火墙转发具有源地址的分组。 反向防火墙确定源数据包的数量是否超过安全阈值。 响应于确定具有源地址的分组的计数超过安全阈值的确定,反向防火墙从接收方主机请求所请求的肯定信任报告。 反向防火墙确定是否从接收者主机接收到指示源互联网协议地址良好的肯定信任报告。 响应于从接收者主机接收到肯定的信任报告的确定,反向防火墙分析具有源地址的分组报头,而不分析分组的有效载荷。