会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Access check system utilizing cached access permissions
    • 访问检查系统利用缓存访问权限
    • US5889952A
    • 1999-03-30
    • US689838
    • 1996-08-14
    • Heath HunnicuttJohn F. Ludeman
    • Heath HunnicuttJohn F. Ludeman
    • G06F1/00G06F21/00G06F17/00
    • G06F21/6218
    • An access-check system for a network server comprises an access-cache for storing access-permissions generated by the server in response to resource access requests. The system retrieves the appropriate access-permission from the access-cache in response to receipt of a request necessitating the same access-permission as already generated for an earlier processed request. A user-token cache is also employed to assign a unique user-token, to be used in the access-cache, to each user logged on to the server. Changes made to the user-token cache are reflected in the access-cache by removing from the access-cache those entries containing the changed user-token. Changes made to an access control list are reflected in the access-cache by removing from the access-cache those entries containing the server resource with which the changed access control list is associated.
    • 用于网络服务器的访问检查系统包括用于存储响应于资源访问请求而由服务器生成的访问许可的访问高速缓存。 响应于接收到需要与先前处理的请求已经生成的相同访问许可的请求,系统从访问缓存中检索适当的访问权限。 还使用用户令牌高速缓存来为登录到服务器的每个用户分配要在访问高速缓存中使用的唯一用户令牌。 通过从访问高速缓存中删除包含更改的用户令牌的条目,可以在访问缓存中反映对用户令牌缓存所做的更改。 通过从访问缓存中删除包含与更改的访问控制列表相关联的服务器资源的条目,对访问控制列表所做的更改将反映在访问高速缓存中。
    • 5. 发明授权
    • Database fragment cloning and management
    • 数据库片段克隆和管理
    • US07890508B2
    • 2011-02-15
    • US11207482
    • 2005-08-19
    • Robert H. GerberBalan Sethu RamanJames R. HamiltonJohn F. LudemanMurali M. KrishnaSamuel H. SmithShrinivas Ashwin
    • Robert H. GerberBalan Sethu RamanJames R. HamiltonJohn F. LudemanMurali M. KrishnaSamuel H. SmithShrinivas Ashwin
    • G06F7/00G06F17/30
    • G06F17/30362G06F11/2094G06F11/2097G06F2201/80
    • Mechanisms and techniques for database fragment cloning and management are provided. A database object, such as a table, rowset or index, is divided into fragments. Each fragment is cloned to create cloned fragments, which operationally are substantially identical to one another. One or more of the cloned fragments may be designated as a primary cloned fragment for performing database operations or as a secondary cloned fragment for serving as backup. Updates to each fragment are implemented on the primary cloned fragment and are then propagated from the primary cloned fragment to the corresponding secondary cloned fragments. A cloned fragment can go offline, becoming unavailable to be updated. When the cloned fragment returns online, the cloned fragment is refreshed with data included in the primary cloned fragment. While being refreshed, the cloned fragment may continue to be updated. The cloned fragment is eligible to be designated as a primary cloned fragment when the refreshing process has been completed.
    • 提供了数据库片段克隆和管理的机制和技术。 数据库对象(如表,行集或索引)被划分成片段。 克隆每个片段以产生克隆的片段,其在操作上基本上彼此相同。 可以将一个或多个克隆的片段指定为用于执行数据库操作的主要克隆片段或用作备份的辅助克隆片段。 对每个片段的更新在主要克隆片段上实现,然后从主要克隆片段扩增到相应的次级克隆片段。 克隆片段可以脱机,不可更新。 当克隆片段返回联机时,克隆片段将使用包含在主克隆片段中的数据进行刷新。 刷新时,克隆片段可能会继续更新。 当刷新过程完成时,克隆片段有资格被指定为主要的克隆片段。
    • 6. 发明授权
    • Method, system and apparatus for client-side usage tracking of
information server systems
    • 用于信息服务器系统的客户端使用跟踪的方法,系统和装置
    • US6018619A
    • 2000-01-25
    • US652976
    • 1996-05-24
    • James E. AllardDavid R. Treadwell, IIIJohn F. Ludeman
    • James E. AllardDavid R. Treadwell, IIIJohn F. Ludeman
    • H04L12/24H04L29/06H04L29/08G06F13/00
    • H04L67/22H04L12/24H04L29/06H04L41/00H04L67/2814H04L69/329
    • A method for tracking usage patterns of users of hyper-media systems, such as the World-Wide Web, that creates a usage log on a user's client computer and periodically transmits the usage log from the user's client machine to a usage tracking server computer to be incorporated in an overall usage log for a given information server computer. Alternatively, proxy server may be connected between a client computer and an information server with the proxy server acting as a client to the information server and creating a usage log of the user's client computer access to the information server computer to be sent to usage tracking computer. Each time a user connects to a Web site, the client computer or proxy server creates a usage log that records all objects retrieved from that particular Web site and other attributes of user processing such as time spent viewing an object, amount of an object viewed, etc. Periodically, upon the occurrence of one of more predefined events that signify the end of a session, computer or proxy server saves the usage log into a single, compressed file and transmits the resulting file to the server. Events that signify the end of a session and trigger the transmission of a usage log from the user's client computer or proxy server computer to the usage tracking server computer may include a predetermined time interval, accessing a predetermined number of objects, application program or operating system shut down, connecting to a different Web site, and/or modem shut down.
    • 一种用于跟踪超媒体系统(例如万维网)的用户的使用模式的方法,其在用户的客户端计算机上创建使用日志并且周期性地将使用日志从用户的客户机发送到使用跟踪服务器计算机 被包含在给定的信息服务器计算机的整体使用日志中。 或者,代理服务器可以连接在客户端计算机和信息服务器之间,代理服务器充当信息服务器的客户端,并创建用户客户端计算机访问要发送到使用情况跟踪计算机的信息服务器计算机的使用日志 。 每次用户连接到网站时,客户端计算机或代理服务器都会创建使用记录,该日志记录从该特定网站检索的所有对象以及用户处理的其他属性,例如查看对象所花费的时间,查看的对象的数量, 等等,在出现表示会话结束的更多预定义事件之一时,计算机或代理服务器将使用日志保存到单个压缩文件中,并将生成的文件发送到服务器。 表示会话结束并触发将用户的客户端计算机或代理服务器计算机传送到使用情况跟踪服务器计算机的事件可以包括预定时间间隔,访问预定数量的对象,应用程序或操作系统 关闭,连接到不同的网站,和/或调制解调器关闭。