会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Method and system for choosing a queue protection key that is tamper-proof from an application
    • 从应用程序中选择防篡改的队列保护密钥的方法和系统
    • US06851059B1
    • 2005-02-01
    • US09692353
    • 2000-10-19
    • Gregory Francis PfisterRenato John RecioDanny Marvin NealSteven Mark Thurber
    • Gregory Francis PfisterRenato John RecioDanny Marvin NealSteven Mark Thurber
    • H04L9/00H04L29/06
    • H04L63/06
    • A method for enabling a Q_key that is tamper proof from applications on a distributed computer system to protect selected network operations is provided. Applications and an operating system (OS) execute on the end nodes and each may access various network resources. In the invention, the network resources are configured for selective access by particular applications or OS.In a preferred embodiment, a control bit of a Q_key, which allows applications to authenticate their use of particular communication resources, i.e., the send and receive queues, is reserved and utilized to signal whether a particular application is allowed access to the resources. Setting the control bit to 0 allows the Q_key to be set by an application directly. When the control bit is set to 1, the Q_key cannot be set by an application and can only be set using a privileged operation performed only by the OS.
    • 提供了一种用于启用防止来自分布式计算机系统上的应用程序的防篡改的Q_key以保护所选网络操作的方法。 应用和操作系统(OS)在终端节点上执行,每个可以访问各种网络资源。 在本发明中,网络资源被配置用于特定应用或OS的选择性访问。在优选实施例中,Q_key的控制位允许应用程序认证其对特定通信资源的使用,即发送和接收队列, 被保留并用于发出特定应用是否被允许访问资源。 将控制位设置为0允许应用程序直接设置Q_key。 当控制位设置为1时,Q_key不能由应用程序设置,只能使用仅由操作系统执行的特权操作进行设置。
    • 7. 发明授权
    • System area network of end-to-end context via reliable datagram domains
    • 通过可靠的数据报域,端到端上下文的系统区域网络
    • US06990528B1
    • 2006-01-24
    • US09692354
    • 2000-10-19
    • Danny Marvin NealRenato John RecioSteven Mark Thurber
    • Danny Marvin NealRenato John RecioSteven Mark Thurber
    • G06F15/16
    • G06F3/0659G06F3/0605G06F3/067
    • A method for associating reliable datagram queue pairs with an underlying end-to-end context of a channel adapter is provided. The method comprises storing a reliable datagram domain (RDD) within the context of a reliable datagram queue pair (RD QP). The same RDD is stored within an end-to-end context (EEC). A partitioning key (P—key) is also stored within the EEC. The RDD cannot be accessed by consumer processes. In the case of incoming messages, the P—keys of the incoming data packet and EEC are compared. If P—keys match, then the RDD's of the RD QP and EEC are compared. If the RDD's match, the packet is processed normally. In the case of outgoing messages, the RDD's of the RD QP and EEC are first compared, and if they match, the P—Key of the EEC is inserted into the transport header of the data packet.
    • 提供了一种用于将可靠数据报队列对与信道适配器的底层端到端上下文相关联的方法。 该方法包括在可靠数据报队列对(RD QP)的上下文中存储可靠数据报域(RDD)。 相同的RDD存储在端到端上下文(EEC)中。 分区键(P - 键)也存储在EEC中。 消费者进程无法访问RDD。 在传入消息的情况下,比较输入数据包和EEC的P - 键。 如果P - 键匹配,则比较RD QP和EEC的RDD。 如果RDD匹配,则该分组被正常处理。 在传出消息的情况下,首先比较RD QP和EEC的RDD,如果匹配,则将EEC的密钥插入到数据包的传输报头中。
    • 8. 发明授权
    • Method and apparatus for reliably choosing a master network manager during initialization of a network computing system
    • 在网络计算系统的初始化期间可靠地选择主网络管理器的方法和装置
    • US06941350B1
    • 2005-09-06
    • US09692346
    • 2000-10-19
    • Giles Roger FrazierGregory Francis PfisterSteven Mark ThurberDono Van-Mierop
    • Giles Roger FrazierGregory Francis PfisterSteven Mark ThurberDono Van-Mierop
    • G06F15/16G06F15/173
    • G06F15/17375H04L63/061
    • A method in a node within network computing system for selecting a master network manager, wherein the first node is associated with a first priority. Requests are sent to the network computing system to discover other nodes within the network computing system. A second priority from the request is identified in response to receiving a response to one of the requests from another node within the network computing system. The first node shifts to a standby mode if it discovers a master subnet manager or the second priority is higher than the first priority. The first node shifts to a master mode if a response containing a priority higher than the first priority is absent in responses received by the first node and the first node has completed checking all other nodes in the network computing system. In the case where the priority received is equal, the comparison is further made on the globally unique identifier which is received from the same node, in which case the node with the lowest globally unique identifier wins the arbitration.
    • 网络计算系统内用于选择主网络管理器的节点中的方法,其中所述第一节点与第一优先级相关联。 将请求发送到网络计算系统以发现网络计算系统内的其他节点。 响应于响应于来自网络计算系统内的另一个节点的一个请求的响应来识别来自请求的第二优先级。 如果发现主子网管理器或第二优先级高于第一优先级,则第一节点转移到待机模式。 如果在由第一节点接收的响应中缺少包含高于第一优先级的优先级的响应,则第一节点转移到主模式,并且第一节点已经完成了对网络计算系统中的所有其他节点的检查。 在接收到的优先级相等的情况下,进一步对从同一节点接收到的全局唯一标识符进行比较,在这种情况下,具有最低全局唯一标识符的节点赢得仲裁。
    • 10. 发明授权
    • Method and system for reliably defining and determining timeout values in unreliable datagrams
    • 用于在不可靠数据报中可靠地定义和确定超时值的方法和系统
    • US06748559B1
    • 2004-06-08
    • US09692349
    • 2000-10-19
    • Gregory Francis PfisterGiles Roger FrazierDanny Marvin NealSteven Mark Thurber
    • Gregory Francis PfisterGiles Roger FrazierDanny Marvin NealSteven Mark Thurber
    • G06F1100
    • H04L41/00H04L41/046H04L41/0806H04L41/082H04L41/12H04L43/0852
    • A method for managing allocation of network resources within the distributed computer system is provided. Specifically, the network traversal time and the end node response time for requests and/or packets being routed in a switch-connected system area network are utilized to determine the total round trip time for completion of the particular network operation. The sum of the timeout values for all switches that participate in routing the request from a requester (source) to the receptor node (target) is provided to the requester's channel adapter (CA). The time-out values are provided by the switch manufacturer and are sent to a network Subnet Manager (SM) via SM packets (SMP). The timeout values added together represent the SubnetTimeout. The time-out value of the target channel adapter (CA), the ResponseTime, is also provided to the requester. The requester then utilizes one of two timeout equations to calculate the overall response time required for the request to be completed. A timer is started and the elapsed time to complete the request is monitored and compared with the overall response time calculated. When the timer expires before a response is received at the requester, the operation is assumed to have failed and the network resources being utilized by the request may be reallocated to another network operation.
    • 提供了一种管理分布式计算机系统内网络资源分配的方法。 具体地,利用在交换机连接的系统区域网络中路由的请求和/或分组的网络遍历时间和终止节点响应时间来确定完成特定网络操作的总往返时间。 参与将请求从请求者(源)路由到接收节点(目标)的所有交换机的超时值的总和提供给请求者的信道适配器(CA)。 超时值由交换机制造商提供,并通过SM数据包(SMP)发送到网络子网管理器(SM)。 添加的超时值表示SubnetTimeout。 目标通道适配器(CA)的超时值ResponseTime也提供给请求者。 然后,请求者使用两个超时方程之一来计算请求完成所需的总体响应时间。 启动定时器,并监视完成请求的经过时间,并与计算的总响应时间进行比较。 当定时器在请求者接收到响应之前到期时,假设该操作已经失败,并且该请求所利用的网络资源可能被重新分配到另一个网络操作。