会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • System and method for communicating confidential messages
    • 用于传达机密信息的系统和方法
    • US20060274856A1
    • 2006-12-07
    • US11143240
    • 2005-06-01
    • Paul DunnAaron BelcherAlan Gatzke
    • Paul DunnAaron BelcherAlan Gatzke
    • H04L27/22
    • H04L63/045H04K1/00H04L9/0825H04L2209/60H04M3/533
    • A method of recording messages includes recording audio data in a first file structured in accordance with a file format that defines a first portion and a second portion. The audio data is recorded in the first portion of the first file. The method also includes encrypting the audio data stored in the first portion of the first file and generating a second file structured according to the file format. The second file includes decoy audio data in the first portion of the second file and the encrypted audio data in the second portion of the second file. The decoy audio data indicates a confidential status of the second file or serves as a red herring to distract from the encrypted audio data in the second portion of the second file.
    • 记录消息的方法包括:将音频数据记录在根据定义第一部分和第二部分的文件格式构成的第一文件中。 音频数据被记录在第一文件的第一部分中。 该方法还包括加密存储在第一文件的第一部分中的音频数据并产生根据文件格式构造的第二文件。 第二文件包括第二文件的第一部分中的诱饵音频数据和第二文件的第二部分中的加密音频数据。 诱饵音频数据指示第二文件的机密状态,或者用作红色鲱鱼,以分散第二文件的第二部分中的加密音频数据。
    • 5. 发明申请
    • Method of detecting memory leaks in software applications
    • 检测软件应用程序中的内存泄漏的方法
    • US20060248103A1
    • 2006-11-02
    • US11119256
    • 2005-04-29
    • Aaron Belcher
    • Aaron Belcher
    • G06F7/00
    • G06F11/366
    • A method for detecting memory leaks includes initializing memory for a process under a load. Bits in a bitmap are then set/reset during a time interval after initialization of the memory. Each bit is set/reset at a location in the bitmap that uniquely corresponds to an address of a memory allocation/deallocation of the process stopping the load. Memory allocations corresponding to remaining bits in the bitmap are listed to identify the leaked memory. It is emphasized that this abstract is provided to comply with the rules requiring an abstract that will allow a searcher or other reader to quickly ascertain the subject matter of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. 37 CFR 1.72(b).
    • 用于检测内存泄漏的方法包括对负载下的进程初始化存储器。 然后在内存初始化之后的时间间隔内,对位图中的位进行置位/复位。 每个位在位图中的位置设置/复位,唯一对应于停止负载的进程的内存分配/解除分配的地址。 列出与位图中剩余位相对应的内存分配,以标识泄漏的内存。 要强调的是,该摘要被提供以符合要求抽象的规则,允许搜索者或其他读者快速确定技术公开内容的主题。 提交它的理解是,它不会用于解释或限制权利要求的范围或含义。 37 CFR 1.72(b)。