会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • Decentralized Sleep Management
    • 分散睡眠管理
    • US20120117404A1
    • 2012-05-10
    • US12940806
    • 2010-11-05
    • Jacob R. LorchSiddhartha SenJitendra D. PadhyeRichard L. HughesCarlos Garcia Jurado Suarez
    • Jacob R. LorchSiddhartha SenJitendra D. PadhyeRichard L. HughesCarlos Garcia Jurado Suarez
    • G06F1/32
    • G06F1/3228G06F1/3209
    • Techniques for employing a decentralized sleep management service are described herein. In some instances, each computing device of a group of computing devices periodically shares information about itself with each other computing device of the group. With this information, each computing device within the group that is awake and capable of managing other devices selects a subset of devices to probe. The devices then probe this subset to determine whether the probed devices are asleep. In response to identifying a sleeping device, the probing device takes over management of the sleeping device. Managing the sleeping device involves informing other devices of the group that the sleeping device is being managed, in addition to monitoring requests for services on the sleeping device. In response to receiving a valid request for a service hosted by the sleeping device, the managing device awakens the sleeping device and ceases managing the now-woken device.
    • 本文描述了采用分散式睡眠管理服务的技术。 在一些情况下,一组计算设备的每个计算设备周期性地与该组的每个其他计算设备共享关于其自身的信息。 利用该信息,组内的每个计算设备清醒并能够管理其他设备选择要探测的设备的子集。 然后,设备探测该子集以确定探测设备是否已经睡着了。 响应于识别睡眠设备,探测设备接管睡眠设备的管理。 管理睡眠设备除了监视睡眠设备上的服务请求之外,还涉及通知该组的其他设备正在管理睡眠设备。 响应于接收到由睡眠设备托管的服务的有效请求,管理设备唤醒睡眠设备并停止管理现在被唤醒的设备。
    • 6. 发明申请
    • SECURING ANTI-VIRUS SOFTWARE WITH VIRTUALIZATION
    • 用虚拟化来保护反病毒软件
    • US20090089879A1
    • 2009-04-02
    • US11863870
    • 2007-09-28
    • Jiahe Helen WangJacob R. LorchBryan Jeffrey Parno
    • Jiahe Helen WangJacob R. LorchBryan Jeffrey Parno
    • G06F21/06
    • G06F21/53
    • The subject disclosure relates to systems and methods that secure anti-virus software through virtualization. Anti-virus systems can be maintained separate from user applications and operating system through virtualization. The user applications and operating system run in a guest virtual machine while anti-virus systems are isolated in a secure virtual machine. The virtual machines are partially interdependent such that the anti-virus systems can monitor user applications and operating systems while the anti-virus systems remain free from possible malicious attack originating from a user environment. Further, the anti-virus system is secured against zero-day attacks so that detection and recovery may occur post zero-day.
    • 本发明涉及通过虚拟化来保护防病毒软件的系统和方法。 防病毒系统可以通过虚拟化与用户应用程序和操作系统分开维护。 用户应用程序和操作系统在客户虚拟机中运行,而防病毒系统在安全虚拟机中被隔离。 这些虚拟机是部分相互依存的,因此防病毒系统可以监控用户应用程序和操作系统,同时防病毒系统保持免受来自用户环境的可能的恶意攻击。 此外,防病毒系统可以抵御零日攻击,从而可以在零日后发生检测和恢复。
    • 7. 发明授权
    • Trusted hardware component for distributed systems
    • 分布式系统的可信硬件组件
    • US09455992B2
    • 2016-09-27
    • US12483338
    • 2009-06-12
    • John R. DouceurDavid M LevinJacob R. LorchThomas Moscibroda
    • John R. DouceurDavid M LevinJacob R. LorchThomas Moscibroda
    • G06F15/16H04L29/06H04L9/32
    • H04L63/123H04L9/3247H04L29/06H04L2209/127
    • Techniques for utilizing trusted hardware components for mitigating the effects of equivocation amongst participant computing devices of a distributed system are described herein. For instance, a distributed system employing a byzantine-fault-resilient protocol—that is, a protocol intended to mitigate (e.g., tolerate, detect, isolate, etc.) the effects of byzantine faults—may employ the techniques. To do so, the techniques may utilize a trusted hardware component comprising a non-decreasing counter and a key. This hardware component may be “trusted” in that the respective participant computing device cannot modify or observe the contents of the component in any manner other than according to the prescribed procedures, as described herein. Furthermore, the trusted hardware component may couple to the participant computing device in any suitable manner, such as via a universal serial bus (USB) connection or the like.
    • 在此描述了利用可信硬件组件来减轻分布式系统的参与者计算设备之间的混淆效应的技术。 例如,采用拜占庭故障弹性协议的分布式系统 - 即旨在减轻(例如,容忍,检测,隔离等)拜占庭故障的影响的协议 - 可以采用这些技术。 为了这样做,这些技术可以利用包括非递减计数器和密钥的可信硬件组件。 该硬件组件可能是“可信赖的”,因为如本文所述,相应的参与者计算设备不能以除了根据规定的过程之外的任何方式修改或观察组件的内容。 此外,可信硬件组件可以以任何合适的方式,例如经由通用串行总线(USB)连接等耦合到参与者计算设备。