会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Request queue management
    • 请求队列管理
    • US07146233B2
    • 2006-12-05
    • US10301497
    • 2002-11-20
    • Ashar AzizThomas MarksonMartin PattersonMark GrayOsman Ismael
    • Ashar AzizThomas MarksonMartin PattersonMark GrayOsman Ismael
    • G06F19/00G06F3/00
    • G06F9/5027G06F9/45504G06F17/30902G06F2209/5021G06F2209/505
    • Methods and apparatus providing, controlling and managing a dynamically sized, highly scalable and available server farm are disclosed. A Virtual Server Farm (VSF) is created out of a wide scale computing fabric (“Computing Grid”) which is physically constructed once and then logically divided up into VSFs for various organizations on demand. Each organization retains independent administrative control of a VSF. A VSF is dynamically firewalled within the Computing Grid. Allocation and control of the elements in the VSF is performed by a control plane connected to all computing, networking, and storage elements in the computing grid through special control ports. The internal topology of each VSF is under control of the control plane. A request queue architecture is also provided for processing work requests that allows selected requests to be blocked until required human intervention is satisfied.
    • 公开了提供,控制和管理动态大小,高度可扩展和可用的服务器场的方法和装置。 虚拟服务器场(VSF)由大规模的计算架构(“计算网格”)创建,物理构建一次,然后根据需要逻辑分为各种组织的VSF。 每个组织都保留对VSF的独立管理控制。 VSF在计算网格内动态防火墙。 通过特殊控制端口连接到计算网格中的所有计算,网络和存储元件的控制平面来执行VSF中的元件的分配和控制。 每个VSF的内部拓扑在控制平面的控制下。 还提供了一种请求队列体系结构,用于处理允许所选择的请求被阻塞的工作请求,直到满足所需的人为干预。
    • 3. 发明授权
    • Approach for allocating resources to an apparatus based on optional resource requirements
    • 基于可选资源需求向设备分配资源的方法
    • US07463648B1
    • 2008-12-09
    • US11042813
    • 2005-01-24
    • Christopher M. EppsteinAshar AzizThomas MarksonMartin Patterson
    • Christopher M. EppsteinAshar AzizThomas MarksonMartin Patterson
    • H04J3/16G06F15/16
    • G06F9/5011H04L29/06H04L41/22H04L63/02H04L67/1097H04L67/34H04L69/329
    • An approach for allocating resources to an apparatus based on resource requirements generally involves a resource allocator receiving a request that specifies resource requirements for the apparatus. A resource allocator determines whether resources are available that satisfy the resource requirements. If resources are available that satisfy a resource requirement, the resource allocator indicates that the resource requirement is fulfilled and the resources are allocated to the apparatus. If resources are not available that satisfy a resource requirement, the resource allocator indicates that the resource requirement is not fulfilled and the resources are not allocated to the apparatus. The apparatus is implemented based on the allocated resources. A resource requirement can be optional so that if the optional resource requirement is not fulfilled, the apparatus can still be implemented. Conversely, a resource requirement can be necessary so that if the necessary resource requirement is not fulfilled, the apparatus is not implemented.
    • 基于资源需求向设备分配资源的方法通常涉及资源分配器,其接收指定该设备资源需求的请求。 资源分配器确定资源是否满足资源需求。 如果资源满足资源需求,则资源分配器指示满足资源需求并将资源分配给设备。 如果不能满足资源需求的资源,则资源分配器指示资源需求不满足,资源未分配给设备。 该装置基于分配的资源来实现。 资源需求可以是可选的,以便如果不满足可选资源需求,则该设备仍然可以被实现。 相反,资源需求可能是必要的,因此如果不满足必要的资源需求,则不实现该设备。
    • 7. 发明授权
    • Approach for allocating resources to an apparatus based on alternative resource requirements
    • 基于替代资源需求为设备分配资源的方法
    • US08019870B1
    • 2011-09-13
    • US11042961
    • 2005-01-24
    • Christopher M. EppsteinAshar AzizThomas MarksonMartin Patterson
    • Christopher M. EppsteinAshar AzizThomas MarksonMartin Patterson
    • G06F15/173
    • H04L41/5051H04L41/22H04L41/5061H04L47/72H04L67/1017
    • An approach for allocating resources to an apparatus based on alternative resource requirements generally involves a resource allocator determining that a resource that satisfies a resource requirement is not available, and based on the resource not being available, the resource allocator determines that another resource that satisfies another resource requirement is available. The resource allocator allocates the other resource to the apparatus, thereby allowing the apparatus to be implemented based on the other resource. The resource requirements are alternatives so that if the one alternative resource requirement cannot be fulfilled, the other alternative resource requirement can be fulfilled. Some alternatives can be preferred over other alternatives in a set of alternative resource requirements. In general, in a set of “n” alternative resource requirements, “m” resource requirements can be specified to be fulfilled, where “m” is less than “n” and “n” is two or greater.
    • 基于替代资源需求将资源分配给设备的方法通常涉及资源分配器,其确定满足资源需求的资源不可用,并且基于资源不可用,资源分配器确定满足另一资源的另一资源 资源需求可用。 资源分配器将另一资源分配给设备,从而允许基于其他资源来实现该设备。 资源需求是替代方案,因此如果一个替代资源需求不能满足,则可以满足另一个替代资源需求。 在一组替代资源需求中,一些替代方案可以优于其他替代方案。 一般来说,在“n”个替代资源要求的集合中,可以指定满足“m”个资源要求,其中“m”小于“n”,“n”为2或更大。
    • 10. 再颁专利
    • System for signatureless transmission and reception of data packets between computer networks
    • USRE39360E1
    • 2006-10-17
    • US09136954
    • 1998-08-19
    • Ashar AzizGeoffrey MulliganMartin PattersonGlenn Scott
    • Ashar AzizGeoffrey MulliganMartin PattersonGlenn Scott
    • H04L9/00
    • H04L63/0428H04L12/22H04L12/4625H04L63/164H04L2212/00
    • A system for automatically encrypting and decrypting data packet sent from a source host to a destination host across a public internetwork. A tunnelling bridge is positioned at each network, and intercepts all packets transmitted to or from its associated network. The tunnelling bridge includes tables indicated pairs of hosts or pairs of networks between which packets should be encrypted. When a packet is transmitted from a first host, the tunnelling bridge of that host's network intercepts the packet, and determines from its header information whether packets from that host that are directed to the specified destination host should be encrypted; or, alternatively, whether packets from the source host's network that are directed to the destination host's network should be encrypted. If so, the packet is encrypted, and transmitted to the destination network along with an encapsulation header indicating source and destination information: either source and destination host addresses, or the broadcast addresses of the source and destination networks (in the latter case, concealing by encryption the hosts' respective addresses). An identifier of the source network's tunnelling bridge may also be included in the encapsulation header. At the destination network, the associated tunnelling bridge intercepts the packet, inspects the encapsulation header, from an internal table determines whether the packet was encrypted, and from either the source (host or network) address or the tunnelling bridge identifier determines whether and how the packet was encrypted. If the packet was encrypted, it is now decrypted using a key stored in the destination tunnelling bridge's memory, and is sent on to the destination host. The tunnelling bridge identifier is used particularly in an embodiment where a given network has more than one tunnelling bridge, and hence multiple possible encryption/decryption schemes and keys. In an alternative embodiment, the automatic encryption and decryption may be carried out by the source and destination hosts themselves, without the use of additional tunnelling bridges, in which case the encapsulation header includes the source and destination host addresses.