会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Distributed lock manager using a passive, state-full control-server
    • 分布式锁管理器使用被动状态完全控制服务器
    • US5454108A
    • 1995-09-26
    • US187432
    • 1994-01-26
    • Murthy DevarakondaAjay Mohindra
    • Murthy DevarakondaAjay Mohindra
    • G06F15/16G06F9/46G06F9/52G06F12/00G06F15/00G06F15/177G06F15/167
    • G06F9/526G06F2209/522G06F2209/523
    • A locking apparatus for a multicomputer system. The lock apparatus is a two level system wherein local lock managers grant locks on a resource only after they have acquired an appropriate token from a rock control server which is the owner of the resource. The lock control server is passive and has all the control information for a resource it owns. When a local lock manager needs a token in a specified mode for a particular resource, it acquires the token from the lock control server. If there are no conflicting tokens, then the rock control server grants the token. However, if there are conflicting tokens, then the lock control server responds with a list of the local lock managers with conflicting tokens. The requesting lock manager then requests each of the local lock managers with conflicting tokens to give it up and to acknowledge when it has done so. When the acknowledgements have been received, the local lock manager requests the lock control server to update its table and grant the requested token.
    • 一种用于多计算机系统的锁定装置。 锁定装置是两级系统,其中本地锁管理器仅在从作为资源的所有者的摇滚控制服务器获取适当的令牌之后才向资源授予锁定。 锁控制服务器是被动的,并且具有其拥有的资源的所有控制信息。 当本地锁管理器需要特定资源的指定模式的令牌时,它将从锁控制服务器获取令牌。 如果没有冲突的令牌,则摇滚控制服务器授予令牌。 但是,如果存在冲突的令牌,则锁定控制服务器将使用具有冲突令牌的本地锁管理器列表进行响应。 然后,请求的锁管理器请求具有冲突的令牌的每个本地锁管理器放弃它并在其完成时进行确认。 当收到确认后,本地锁管理器请求锁控制服务器更新其表并授予所请求的令牌。
    • 4. 发明授权
    • Dynamic mobile agents
    • 动态移动代理
    • US6055562A
    • 2000-04-25
    • US847079
    • 1997-05-01
    • Murthy DevarakondaAjay MohindraApratim PurakayasthaDeborra Jean Zukowski
    • Murthy DevarakondaAjay MohindraApratim PurakayasthaDeborra Jean Zukowski
    • G06F15/16G06F9/46G06F9/50G06F12/00G06F13/00H04L29/06H04L29/08H04L29/12
    • H04L29/12047G06F9/4862H04L29/06H04L29/12009H04L61/15H04L67/10H04L67/1008H04L67/1021H04L2029/06054H04L67/1002H04L69/329
    • An improved method and apparatus for dynamic execution of mobile agents. For example, a symbolic name for a component to be executed can be dynamically resolved using a component directory to determine an appropriate network host that the agent needs to visit. Preferably, the component directory can be queried by client or host machines, and updated by component hosts. Changes in a component's location and/or availability can also be captured at runtime and the agents dynamically routed to alternate component hosts. Still other features enable agents to flexibly accommodate the dynamics of the system. For example, if the attributes of a component are modified, or a component host becomes heavily loaded, agents can adapt to such changes by looking up an alternate host for the same component. Yet other features provide improved system manageability. For example, component hosts can freely update a component's location and/or attributes at any time. Changes to code for agents that use components residing at an updated component location are not required.
    • 一种用于动态执行移动代理的改进方法和装置。 例如,可以使用组件目录来动态地解析要执行的组件的符号名称,以确定代理需要访问的适当的网络主机。 优选地,组件目录可以由客户机或主机查询,并由组件主机更新。 还可以在运行时捕获组件位置和/或可用性的更改,并将代理程序动态路由到备用组件主机。 还有其他功能使代理能够灵活地适应系统的动态。 例如,如果组件的属性被修改或组件主机变得负载过重,则代理可以通过查找相同组件的备用主机来适应这些更改。 其他功能提供了改进的系统可管理性。 例如,组件主机可以随时自由地更新组件的位置和/或属性。 不需要对使用位于更新组件位置的组件的代理程序的代码进行更改。
    • 6. 发明授权
    • Method and apparatus for security-aware elasticity of application and services
    • 应用和服务的安全感知弹性的方法和装置
    • US08793766B2
    • 2014-07-29
    • US13419037
    • 2012-03-13
    • Ashish KunduAjay MohindraSambit Sahu
    • Ashish KunduAjay MohindraSambit Sahu
    • G06F21/00H04L29/06G06F9/50
    • G06F21/604G06F2209/5019
    • In a method for scaling up/down security (non-functional) components of an application, determine (a) types of interactions and a number of each type of interaction each non-security (functional) component has with security components for a plurality of requests. Determine, based on (a) and an expected number of incoming requests to the application, (b) types of requests to and interactions with the security components involving the non-security components and (c) a number of requests to and interactions with the security components involving non-security components for each type of request to the security components involving non-security components. Determine, for each security component, a capacity required for each type of request involving the non-security components and a capacity required for each type of interaction involving the non-security components. Change the capacities of the security components to new capacities, wherein the new capacities are based on (a), (c) and the determined capacities.
    • 在用于扩展/降低应用程序的安全性(非功能))组件的方法中,确定(a)每个非安全(功能)组件具有的多个交互的安全组件的交互类型和每种类型的交互的数量, 要求。 根据(a)和对应用程序的传入请求的预期数量确定(b)与涉及非安全组件的安全组件的请求类型和与其相互作用,以及(c)与 涉及非安全组件的安全组件,用于针对涉及非安全组件的安全组件的每种请求类型。 为每个安全组件确定涉及非安全组件的每种类型的请求所需的容量以及涉及非安全组件的每种类型的交互所需的容量。 将安全组件的能力改变为新能力,其中新能力基于(a),(c)和确定的能力。