会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Generating a code alphabet of symbols to generate codewords for words used with a program
    • 生成符号的代码字母表以生成与程序一起使用的字的码字
    • US08692696B2
    • 2014-04-08
    • US13342899
    • 2012-01-03
    • Roy D. CideciyanGlen A. JaquetteThomas Mittelholzer
    • Roy D. CideciyanGlen A. JaquetteThomas Mittelholzer
    • H03M7/30
    • H03M7/40
    • Provided are a computer program product, system, and method for generating a code alphabet for use by a deployed program to determine codewords for words. A first code alphabet is generated having a first number of symbols that provide variable length codings of the words. The symbols in the first code alphabet are merged into a second number of groups of the symbols in the first code alphabet, where the second number is less than the first number. A second code alphabet is generated having the second number of symbols, wherein a second average codeword length of the codewords produced using the symbols in the second code alphabet is smaller than the codeword length (b) of the words, and wherein the second code alphabet comprises the code alphabet used by the deployed program.
    • 提供了一种用于生成代码字母表的计算机程序产品,系统和方法,用于部署程序用于确定字的码字。 产生具有提供字的可变长度编码的符号的第一数量的第一代码字母表。 第一代码字母表中的符号被合并到第一代码字母表中的第二数量的符号组中,其中第二个数字小于第一个数字。 产生具有第二数量符号的第二码字母,其中使用第二码字母表中的符号产生的码字的第二平均码字长度小于字的码字长度(b),并且其中第二码字母 包括部署程序使用的代码字母表。
    • 2. 发明申请
    • GENERATING A CODE ALPHABET OF SYMBOLS TO GENERATE CODEWORDS FOR WORDS USED WITH A PROGRAM
    • 生成用于生成与程序一起使用的文字的编码的符号代码标签
    • US20130169453A1
    • 2013-07-04
    • US13342899
    • 2012-01-03
    • Roy D. CideciyanGlen A. JaquetteThomas Mittelholzer
    • Roy D. CideciyanGlen A. JaquetteThomas Mittelholzer
    • H03M7/40
    • H03M7/40
    • Provided are a computer program product, system, and method for generating a code alphabet for use by a deployed program to determine codewords for words. A first code alphabet is generated having a first number of symbols that provide variable length codings of the words. The symbols in the first code alphabet are merged into a second number of groups of the symbols in the first code alphabet, where the second number is less than the first number. A second code alphabet is generated having the second number of symbols, wherein a second average codeword length of the codewords produced using the symbols in the second code alphabet is smaller than the codeword length (b) of the words, and wherein the second code alphabet comprises the code alphabet used by the deployed program.
    • 提供了一种用于生成代码字母表的计算机程序产品,系统和方法,用于部署程序用于确定字的码字。 产生具有提供字的可变长度编码的符号的第一数量的第一代码字母表。 第一代码字母表中的符号被合并到第一代码字母表中的第二数量的符号组中,其中第二个数字小于第一个数字。 产生具有第二数量符号的第二码字母,其中使用第二码字母表中的符号产生的码字的第二平均码字长度小于字的码字长度(b),并且其中第二码字母 包括部署程序使用的代码字母表。
    • 9. 发明授权
    • Use of indirect data keys for encrypted tape cartridges
    • 对加密磁带使用间接数据密钥
    • US08656186B2
    • 2014-02-18
    • US11742837
    • 2007-05-01
    • Paul M. GrecoShai HaleviGlen A. Jaquette
    • Paul M. GrecoShai HaleviGlen A. Jaquette
    • H04L29/06
    • G11B20/1201G11B20/00086G11B20/0021G11B2220/90H04L9/083H04L9/14
    • A method, system and program are provided for enabling selective access to multiple users' encrypted data in a single storage cartridge. A unique, derived key is generated for each user's data by performing cryptographic operations on a combination of a common base key and metadata related to the data to be encrypted (e.g. its total block count). The base data key is wrapped with one or more encryption keys to form one or more encryption encapsulated data keys (EEDKs). The base key and the derived key are wrapped to create a session encrypted data key (SEDK), which along with the EEDKs, are conveyed to the tape drive, where the SEDK is decrypted. The EEDKs are then stored in one or more places on the storage cartridge. The base key and the derived key are used to encrypt a predetermined user's data, with the derived key stored on the cartridge with the encrypted data. The encrypted data may be subsequently decrypted by retrieving the EEDK and decrypting it with a decryption key to extract the base data key. The extracted base data key can then be used with other information to calculate the derived key. Once calculated, the derived key is used to decrypt its associated encrypted data.
    • 提供了一种方法,系统和程序,用于使得能够选择性地访问单个存储盒中的多个用户的加密数据。 通过对与要加密的数据相关的公共基本密钥和元数据的组合(例如,其总块计数)执行加密操作,为每个用户的数据生成唯一的派生密钥。 基本数据密钥用一个或多个加密密钥包裹以形成一个或多个加密封装数据密钥(EEDK)。 基础密钥和派生密钥被包装以创建会话加密数据密钥(SEDK),其与EEDK一起被传送到SEDK被解密的磁带驱动器。 然后将EEDK存储在存储盒上的一个或多个位置。 基本密钥和派生密钥用于加密预定用户的数据,其中导出的密钥存储在盒上,其中加密的数据。 可以随后通过检索EEDK并用解密密钥对加密数据进行解密,以提取基本数据密钥。 然后,提取的基本数据密钥可以与其他信息一起使用以计算导出密钥。 一旦计算,派生密钥用于解密其相关联的加密数据。
    • 10. 发明授权
    • Methods for managing ownership of redundant data and systems thereof
    • 管理冗余数据的所有权的方法及其系统
    • US08539154B2
    • 2013-09-17
    • US12893987
    • 2010-09-29
    • Glen A. Jaquette
    • Glen A. Jaquette
    • G06F12/00
    • G06F12/0811G06F3/061G06F3/0647G06F3/0685H04N21/231H04N21/2393H04N21/25808H04N21/274
    • A storage system according to one embodiment includes a first storage tier; a second storage tier; logic for storing instances of a file in the first storage tier and the second storage tier; logic for determining when to migrate an instance of the file associated with a first user and stored on the first storage tier to the second storage tier; logic for searching for an instance of the file or portion thereof on the second storage tier that is not associated with any user; logic for associating the instance of the file or portion thereof on the second storage tier with the first user; and logic for disassociating the instance of the file on the first storage tier from the first user. Additional systems, methods, and computer program products are also presented.
    • 根据一个实施例的存储系统包括第一存储层; 第二存储层; 在第一存储层和第二存储层中存储文件实例的逻辑; 用于确定何时将与第一用户相关联并存储在第一存储层上的文件的实例迁移到第二存储层的逻辑; 在第二存储层上搜索与任何用户不相关联的文件或其部分的实例的逻辑; 用于将第二存储层上的文件或其部分的实例与第一用户相关联的逻辑; 以及用于将第一存储层上的文件的实例与第一用户分离的逻辑。 还介绍了其他系统,方法和计算机程序产品。