会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Method to qualify access to a block storage device via augmentation of the device'S controller and firmware flow
    • 通过增加设备的控制器和固件流来限制访问块存储设备的方法
    • US08161258B2
    • 2012-04-17
    • US13100138
    • 2011-05-03
    • Mark DoranVincent ZimmerMichael A. Rothman
    • Mark DoranVincent ZimmerMichael A. Rothman
    • G06F12/14
    • G06F3/0644G06F3/0623G06F3/0676
    • A method to qualify access to a block storage device via augmentation of the device's controller and firmware flow. The method employs one or more block exclusion vectors (BEVs) that include attributes specifying allowed access operations for corresponding block address ranges. Logic in accordance with the BEVs is programmed into the controller for the block storage device, such as a disk drive controller for a disk drive. In response to an access request, a block address range corresponding to the storage block(s) requested to be accessed is determined. Based on the BEV entries, a determination is made to whether the determined logical block address range is covered by a corresponding BEV entry. If so, the attributes of the BEV are used to determine whether the access operation is allowed. The method may be used to secure access to firmware stored on a disk drive, thus enabling a system configuration that does not require a conventional firmware storage device.
    • 一种通过增加设备的控制器和固件流来限制访问块存储设备的方法。 该方法采用一个或多个块排除向量(BEV),其包括指定相应块地址范围的允许访问操作的属性。 根据BEV的逻辑被编程到用于块存储设备的控制器中,例如用于磁盘驱动器的磁盘驱动器控制器。 响应于访问请求,确定与请求访问的存储块相对应的块地址范围。 基于BEV条目,确定所确定的逻辑块地址范围是否被相应的BEV条目覆盖。 如果是,则使用BEV的属性来确定是否允许访问操作。 该方法可以用于保护对存储在磁盘驱动器上的固件的访问,从而实现不需要常规固件存储设备的系统配置。
    • 5. 发明授权
    • Method for firmware variable storage with eager compression, fail-safe extraction and restart time compression scan
    • 固件变量存储方法,具有急切压缩,故障安全提取和重启时间压缩扫描
    • US07934209B2
    • 2011-04-26
    • US10561049
    • 2004-05-26
    • Vincent ZimmerMichael RothmanGreg MillerMark Doran
    • Vincent ZimmerMichael RothmanGreg MillerMark Doran
    • G06F9/44
    • G06F9/4401H03M7/30
    • Firmware-based conversion methods for storing converted firmware variables in a firmware storage device, such as flash memory. Under one method, “eager” compression of firmware is performed. In response to a storage request, a determination is made to whether a compressor is available. If it is, the firmware variable is stored in a compressed form in the storage device; if not, the firmware variable is stored in an uncompressed form. In response to a read request for a stored firmware variable, a determination is made to whether the variable is stored in a compressed or uncompressed form. If it is compressed, a decompressor is employed to return the variable to its uncompressed form prior to providing it to the requestor; already uncompressed variables are provided directly to the requester. An application program interface is provided to enable operating system runtime access to the firmware variables. Similar conversions may be employed separately or in parallel, including encryption.
    • 用于将转换的固件变量存储在诸如闪存的固件存储设备中的基于固件的转换方法。 在一种方法下,执行固件的“急切”压缩。 响应于存储请求,确定压缩机是否可用。 如果是,固件变量以压缩形式存储在存储设备中; 如果没有,则固件变量以未压缩形式存储。 响应对存储的固件变量的读取请求,确定变量是以压缩形式还是未压缩形式存储。 如果它被压缩,则使用解压缩器在将变量提供给请求者之前将其变为未压缩的形式; 已经将未压缩的变量直接提供给请求者。 提供一个应用程序接口,以使操作系统运行时访问固件变量。 类似的转换可以单独或并行使用,包括加密。
    • 9. 发明申请
    • Footwear and Systems and Methods For Merchandising Footware
    • 用于销售鞋类的鞋类和系统和方法
    • US20130025161A1
    • 2013-01-31
    • US13644557
    • 2012-10-04
    • Mark Doran
    • Mark Doran
    • A43B7/14
    • A43B3/108A43B1/0027A43B9/00A47F5/0018
    • In one embodiment, a footwear product line is provided comprising at least nine models of footwear, with at least three different sizes and at least three levels of firmness. Each of the footwear comprises a sole portion, an upper portion attached to the sole portion and configured for retaining the footwear on a wearer's foot, and a support portion located within the sole portion, wherein said models of footwear within the product line differ only in size and the cushioning properties of the support portion. In one embodiment, a footwear product line is provided comprising at least two different models of footwear, with at least two levels of firmness.
    • 在一个实施例中,提供鞋类产品线,其包括至少九种型号的鞋类,具有至少三种不同的尺寸和至少三个坚固度。 每个鞋类包括鞋底部分,上部附接到鞋底部分并且构造成用于将鞋类保持在穿着者的脚上,以及位于鞋底部分内的支撑部分,其中,产品线内的鞋类型仅在 尺寸和支撑部分的缓冲性能。 在一个实施例中,提供鞋类产品线,其包括至少两种不同型号的鞋类,具有至少两个坚固度。
    • 10. 发明申请
    • METHOD TO QUALIFY ACCESS TO A BLOCK STORAGE DEVICE VIA AUGMENTATION OF THE DEVICE'S CONTROLLER AND FIRMWARE FLOW
    • 通过设备控制器和固件流程的获取来确定访问块存储设备的方法
    • US20110246715A1
    • 2011-10-06
    • US13100138
    • 2011-05-03
    • Mark DoranVincent ZimmerMichael A. Rothman
    • Mark DoranVincent ZimmerMichael A. Rothman
    • G06F12/14G06F12/00
    • G06F3/0644G06F3/0623G06F3/0676
    • A method to qualify access to a block storage device via augmentation of the device's controller and firmware flow. The method employs one or more block exclusion vectors (BEVs) that include attributes specifying allowed access operations for corresponding block address ranges. Logic in accordance with the BEVs is programmed into the controller for the block storage device, such as a disk drive controller for a disk drive. In response to an access request, a block address range corresponding to the storage block(s) requested to be accessed is determined. Based on the BEV entries, a determination is made to whether the determined logical block address range is covered by a corresponding BEV entry. If so, the attributes of the BEV are used to determine whether the access operation is allowed. The method may be used to secure access to firmware stored on a disk drive, thus enabling a system configuration that does not require a conventional firmware storage device.
    • 一种通过增加设备的控制器和固件流来限制访问块存储设备的方法。 该方法采用一个或多个块排除向量(BEV),其包括指定相应块地址范围的允许访问操作的属性。 根据BEV的逻辑被编程到用于块存储设备的控制器中,例如用于磁盘驱动器的磁盘驱动器控制器。 响应于访问请求,确定与请求访问的存储块相对应的块地址范围。 基于BEV条目,确定所确定的逻辑块地址范围是否被相应的BEV条目覆盖。 如果是,则使用BEV的属性来确定是否允许访问操作。 该方法可以用于保护对存储在磁盘驱动器上的固件的访问,从而实现不需要常规固件存储设备的系统配置。