会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Method and system for network emulation
    • 网络仿真方法与系统
    • US07555420B2
    • 2009-06-30
    • US10951985
    • 2004-09-28
    • Jian WangZheng NiMarco PiumattiRamakrishnan L. PeruvembaJames R. BoldmanIvan Davtchev
    • Jian WangZheng NiMarco PiumattiRamakrishnan L. PeruvembaJames R. BoldmanIvan Davtchev
    • G06F9/455
    • H04L41/145H04L29/08846H04L41/0803H04L67/28H04L69/14
    • A system and method for emulation of a network link include an application programming interface (API) for testing distributed applications by way of a network emulator. According to aspects of the invention, a method and computer program product are disclosed for providing an interface to a user application for configuring a network emulator. According to another aspect of the invention, a system for configuring a network emulator by way of a user application is provided. The API includes exposed functions for creating a virtual channel, creating a virtual link in the virtual channel, deleting the virtual channel, deleting the virtual link, obtaining trace data, obtaining a packet filter for the virtual channel, obtaining a link rule and the number of instances of the virtual link, initializing the emulator, modifying the virtual channel, modifying the virtual link, setting trace information for the emulator, shutting down the emulator, and stopping the emulation.
    • 用于仿真网络链路的系统和方法包括用于通过网络仿真器测试分布式应用的应用程序编程接口(API)。 根据本发明的方面,公开了一种用于向用户应用提供用于配置网络仿真器的接口的方法和计算机程序产品。 根据本发明的另一方面,提供了一种用于通过用户应用配置网络仿真器的系统。 该API包括用于创建虚拟通道的公开功能,在虚拟通道中创建虚拟链路,删除虚拟通道,删除虚拟链路,获取跟踪数据,获取虚拟通道的数据包过滤器,获取链接规则和数字 虚拟链路的实例,初始化仿真器,修改虚拟通道,修改虚拟链路,设置仿真器的跟踪信息,关闭仿真器以及停止仿真。
    • 4. 发明申请
    • Trusted store tamper detection
    • 可信存储篡改检测
    • US20070101131A1
    • 2007-05-03
    • US11265265
    • 2005-11-01
    • Ivan DavtchevKaran DhillonNir ZviAaron GoldsmidPing XieYifat Sagiv
    • Ivan DavtchevKaran DhillonNir ZviAaron GoldsmidPing XieYifat Sagiv
    • H04L9/00
    • G06F21/64
    • A security flag stored in a trusted store is utilized to determine if the trusted store has been subjected to tampering. The security flag is indicative of a globally unique identifier (GUID), the version of the trusted store, and a counter. The security flag is created when the trusted store is created. Each time a critical event occurs, the security flag is updated to indicate the occurrence thereof. The security flag also is stored in a write-once portion of the system registry. At appropriate times, the security flag stored in the trusted store is compared with the corresponding security flag stored in the write-once registry. If the security flags match within a predetermined tolerance, it is determined that the trusted store has not been subjected to tampering. If the security flags do not match, or if a security flag is missing, it is determined that the trusted store has been subjected to tampering.
    • 使用存储在可信存储中的安全标志来确定可信存储是否已经被篡改。 安全标志指示全局唯一标识符(GUID),可信存储的版本和计数器。 创建可信存储时创建安全标志。 每当发生紧急事件时,安全标志被更新以指示其发生。 安全标志也存储在系统注册表的一次写入部分中。 在适当的时间,将存储在可信存储中的安全标志与存储在一次写入注册表中的对应的安全标志进行比较。 如果安全标志在预定公差内匹配,则确定可信存储没有遭受篡改。 如果安全标志不匹配,或者如果安全标志丢失,则确定可信存储已经受到篡改。