会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Determining the physical location of resources on and proximate to a network
    • 确定网络上和附近的资源的物理位置
    • US07257108B2
    • 2007-08-14
    • US10901361
    • 2004-07-28
    • Richard W. ChestonDaryl Carvis CromerDhruv Manmohandas DesaiHoward Jeffrey LockerJames Peter Ward
    • Richard W. ChestonDaryl Carvis CromerDhruv Manmohandas DesaiHoward Jeffrey LockerJames Peter Ward
    • H04Q7/24
    • H04L41/12
    • A network includes a plurality of wall plates, each of the wall plates couples a network resource such as a computer or a network attached device to the network and includes an RFID circuit to detect proximate devices having an RFID tag. The proximate devices can be network attached devices or non network attached devices such as desks, phones, and artwork. Logic is included within each wall plate which includes wall plate physical location information. The logic is designed to respond to a broadcast signal. In so doing, the physical location of any resource can be determined. The physical location of all known resources are provided to an inventory application in the network, thereby allowing network administrators and users to remotely determine the physical location (room, floor, building, etc.) of any and all known resources attached to the network. Likewise, local computer users are able to identify the network resources located in their vicinity.
    • 网络包括多个壁板,每个壁板将诸如计算机或网络连接设备的网络资源耦合到网络,并且包括用于检测具有RFID标签的附近设备的RFID电路。 邻近设备可以是网络连接设备或非网络连接的设备,例如书桌,电话和艺术品。 逻辑包括在每个墙板内,其中包括墙板物理位置信息。 该逻辑被设计为响应广播信号。 这样做可以确定任何资源的物理位置。 将所有已知资源的物理位置提供给网络中的库存应用程序,从而允许网络管理员和用户远程确定附加到网络的任何和所有已知资源的物理位置(房间,楼层,建筑物等)。 同样,本地计算机用户能够识别位于其附近的网络资源。
    • 7. 发明授权
    • Data processing system and method for permitting only preregistered hardware to access a remote service
    • 仅允许预注册硬件访问远程服务的数据处理系统和方法
    • US06654886B1
    • 2003-11-25
    • US09356189
    • 1999-07-16
    • David Carroll ChallenerDaryl Carvis CromerDhruv Manmohandas DesaiHoward Jeffrey LockerAndy Lloyd TrotterJames Peter Ward
    • David Carroll ChallenerDaryl Carvis CromerDhruv Manmohandas DesaiHoward Jeffrey LockerAndy Lloyd TrotterJames Peter Ward
    • G06F1130
    • H04L63/0853G06F21/31G06F2221/2129
    • A data processing system and method are disclosed for permitting only preregistered client computer hardware to access a service executing on a remote server computer system. A log-in token is established including a unique identifier which identifies a particular client computer hardware. The client computer hardware logs-on to the server computer system. Subsequent to the client computer hardware logging-on to the server computer system, the client computer hardware attempts to access the service. During the attempt, the client computer hardware transmits the log-in token to the server computer system. The server computer system utilizes the unique identifier included within the log-in token to determine if the client computer hardware is registered to access the service. In response to a determination that the client computer hardware is registered to access the service, the server computer system permits the client computer hardware to access the service. In response to a determination that the client computer hardware is not registered to access the service, the server computer system prohibits the client computer hardware from accessing the service.
    • 公开了一种用于仅允许预注册的客户端计算机硬件访问在远程服务器计算机系统上执行的服务的数据处理系统和方法。 建立登录令牌,其包括标识特定客户端计算机硬件的唯一标识符。 客户端计算机硬件登录到服务器计算机系统。 在客户端计算机硬件登录到服务器计算机系统之后,客户端计算机硬件尝试访问该服务。 在尝试期间,客户端计算机硬件将登录令牌传输到服务器计算机系统。 服务器计算机系统利用包括在登录令牌内的唯一标识符来确定客户端计算机硬件是否被注册以访问该服务。 响应于确定客户端计算机硬件被注册以访问服务,服务器计算机系统允许客户端计算机硬件访问该服务。 响应于确定客户端计算机硬件未被注册以访问服务,服务器计算机系统禁止客户端计算机硬件访问服务。
    • 8. 发明授权
    • Data processing system and method for prohibiting unauthorized modification of transmission priority levels
    • 用于禁止未经授权修改传输优先级的数据处理系统和方法
    • US06701349B1
    • 2004-03-02
    • US09356190
    • 1999-07-16
    • Daryl Carvis CromerBrandon Jon EllisonEric Richard KernHoward Jeffery LockerAndy Lloyd TrotterJames Peter Ward
    • Daryl Carvis CromerBrandon Jon EllisonEric Richard KernHoward Jeffery LockerAndy Lloyd TrotterJames Peter Ward
    • G06F1300
    • H04L63/10G06F13/385H04L63/126H04L67/322H04L69/329
    • A data processing system and method are disclosed for prohibiting an unauthorized user from modifying a priority level associated with a client computer system. The priority level is utilized by a client computer system during transmission of the client's data over a network. One of a plurality of priority levels is associated with the client computer system. The plurality of priority levels includes a higher priority level and a lower priority level. The client computer system associates the priority level with the data transmitted by the client computer system over the network. The data associated with the higher priority level is typically transmitted prior to data associated with the lower priority level. In response to an attempt to modify the associated priority level, the client determines whether the attempt is being made by an approved user. In response to a determination that the attempt is not being made by an approved user, the attempted modification of the priority level is prohibited. In another embodiment, a priority level may be associated with each class of data. When the client computer system transmits a packet, the client determines which class of data is included in the packet. The priority level associated with that class is then associated with the packet including that class of data. The client, then, transmits the packet which is associated with one of the priority levels.
    • 公开了一种数据处理系统和方法,用于禁止未经授权的用户修改与客户端计算机系统相关联的优先级。 在通过网络传送客户端的数据时,客户端计算机系统利用优先级。 多个优先级中的一个与客户端计算机系统相关联。 多个优先级包括较高优先级和较低优先级。 客户端计算机系统将优先级与客户端计算机系统通过网络发送的数据相关联。 与较高优先级相关联的数据通常在与较低优先级相关联的数据之前传输。 响应于尝试修改相关联的优先级,客户端确定尝试是否由批准​​用户进行。 为了对被许可用户不进行尝试的确定作出回应,禁止尝试修改优先级。 在另一个实施例中,优先级可以与每类数据相关联。 当客户端计算机系统发送数据包时,客户端确定数据包中包含哪一类数据。 然后,与该类相关联的优先级与包括该类数据的分组相关联。 然后,客户端发送与优先级中的一个相关联的分组。
    • 10. 发明授权
    • Use of hidden partitions in a storage device for storing BIOS extension files
    • 在存储设备中使用隐藏的分区来存储BIOS扩展文件
    • US06725178B2
    • 2004-04-20
    • US10050032
    • 2002-01-15
    • Richard W. ChestonDaryl Carvis CromerHoward Jeffrey LockerDavid B. RhoadesJames Peter Ward
    • Richard W. ChestonDaryl Carvis CromerHoward Jeffrey LockerDavid B. RhoadesJames Peter Ward
    • G06F1130
    • G06F21/572G06F9/4401G06F21/575
    • A system and method for storing adapter card Option ROM BIOS extensions on the system's DASD and, more particularly, on a partition of the DASD that is generally inaccessible to the operating system. The system may partition the system DASD into a user partition and a hidden partition where the hidden partition is preferably inaccessible to the operating system. BIOS extensions files are stored in the hidden partition. The system BIOS, when executed, identifies the peripheral devices on the system and interrogates the hidden partition for BIOS extension files corresponding to each of the identified devices. If the hidden partition contains a BIOS extension file corresponding to an identified peripheral device, the file is verified for authenticity. If the verification completes successfully, the BIOS extension file is copied into shadow RAM and control is passed to it. In one embodiment, each BIOS extension file are downloaded to the system's DASD using a standards-based update process that is independent of the vendor or adapter card type.
    • 用于在系统的DASD上存储适配器卡选项ROM BIOS扩展的系统和方法,更具体地,在通常对操作系统不可访问的DASD的分区上。 系统可以将系统DASD划分成用户分区和隐藏分区,其中隐藏分区优选地对于操作系统是不可访问的。 BIOS扩展文件存储在隐藏分区中。 系统BIOS在执行时识别系统上的外围设备,并询问与每个已识别设备相对应的BIOS扩展文件的隐藏分区。 如果隐藏的分区包含与识别的外围设备相对应的BIOS扩展文件,则验证该文件的真实性。 如果验证成功完成,BIOS扩展文件将被复制到影子RAM中,并将控制传递给它。 在一个实施例中,使用独立于供应商或适配卡类型的基于标准的更新过程将每个BIOS扩展文件下载到系统的DASD。