会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 91. 发明申请
    • Leveraging Remote Server Pools for Client Applications
    • 利用客户端应用程序的远程服务器池
    • US20100318630A1
    • 2010-12-16
    • US12484356
    • 2009-06-15
    • Jonathan R. HowellJeremy E. ElsonJohn R. DouceurJacob R. Lorch
    • Jonathan R. HowellJeremy E. ElsonJohn R. DouceurJacob R. Lorch
    • G06F15/16
    • G06F9/5055G06F2209/509
    • Techniques for enabling client computing devices to leverage remote server pools for increasing the effectiveness of applications stored on the client computing device are described herein. In some instances, the server pools comprise a “cloud”, “cluster” or “data center” that comprises hundreds or thousands of servers connected together by a network that has an extremely low latency and high bandwidth relative to the network through which the client computing device connects to the server pool. The client computing device may request that the server pool perform a certain task for an application whose canonical state resides on the client. After computation of a result of the task, a server of the server pool then provides the result to the client. By doing so, the techniques dramatically increase the amount of resources working on the request of the client and, hence, dramatically increase the speed and effectiveness of the client-side application.
    • 本文描述了使客户端计算设备能够利用远程服务器池来增加存储在客户端计算设备上的应用的有效性的技术。 在某些情况下,服务器池包括一个“云”,“集群”或“数据中心”,其中包含数百或数千个由网络连接在一起的服务器,网络具有相对于网络极低的延迟和高带宽,客户端 计算设备连接到服务器池。 客户端计算设备可以请求服务器池为其规范状态驻留在客户端上的应用执行特定任务。 在计算任务的结果之后,服务器池的服务器然后将结果提供给客户端。 通过这样做,这些技术大大增加了根据客户端请求工作的资源量,从而大大提高了客户端应用程序的速度和有效性。
    • 92. 发明申请
    • Executing Native-Code Applications in a Browser
    • 在浏览器中执行本地代码应用程序
    • US20100287618A1
    • 2010-11-11
    • US12463892
    • 2009-05-11
    • Jonathan R. HowellJacob R. LorchJeremy E. ElsonJohn R. Douceur
    • Jonathan R. HowellJacob R. LorchJeremy E. ElsonJohn R. Douceur
    • G06F21/22G06F9/445G06F15/177
    • G06F21/53G06F8/60G06F9/468G06Q20/1235
    • Techniques for leveraging legacy code to deploy native-code desktop applications over a network (e.g., the Web) are described herein. These techniques include executing an application written in native code within a memory region that hardware of a computing device enforces. For instance, page-protection hardware (e.g., a memory management unit) or segmentation hardware may protect this region of memory in which the application executes. The techniques may also provide a narrow system call interface out of this memory region by dynamically enforcing system calls made by the application. Furthermore, these techniques may enable a browser of the computing device to function as an operating system for the native-code application. These techniques thus allow for execution of native-code applications on a browser of a computing device and, hence, over the Web in a resource-efficient manner and without sacrificing security of the computing device.
    • 本文描述了利用传统代码通过网络(例如,Web)来部署本地代码桌面应用程序的技术。 这些技术包括执行在计算设备的硬件实施的存储器区域内以本地代码编写的应用程序。 例如,页面保护硬件(例如,存储器管理单元)或分段硬件可以保护应用程序执行的存储器区域。 这些技术还可以通过动态地执行由应用程序进行的系统调用来提供超出该存储器区域的窄系统调用接口。 此外,这些技术可以使得计算设备的浏览器能够用作本地代码应用的操作系统。 因此,这些技术允许在计算设备的浏览器上执行本地代码应用,并因此允许以资源有效的方式在Web上执行,而不会牺牲计算设备的安全性。
    • 97. 发明授权
    • Byzantine fault quantifying clock synchronization
    • 拜占庭故障量化时钟同步
    • US07454521B2
    • 2008-11-18
    • US10694596
    • 2003-10-23
    • Jonathan R. HowellJohn R. Douceur
    • Jonathan R. HowellJohn R. Douceur
    • G06F15/173
    • H04L63/126G06F1/12G06F1/14G06F21/725
    • The clocks of remote computing devices are synchronized within a range of certainty through the determination of an upper bound and a lower bound around a reference time. A message from a computing device is propagated up a network tree of devices to a device having a reference time, which encodes the reference time and returns the message down the tree. Each receiving device can determine that the reference time could not have occurred before their transmission of the message, nor could it have occurred after their receipt of the return message. Cryptographic hashes can be used to guard against malicious computing devices. Alternate paths and scheduling of messages can be used to provide a narrower spread between the upper and lower bounds, and clock drift can be accounted for by increasing the spread over time.
    • 通过确定参考时间周围的上限和下限,远程计算设备的时钟在确定的范围内同步。 来自计算设备的消息被传播到设备的网络树到具有参考时间的设备,该参考时间对参考时间进行编码并将消息返回到树下。 每个接收设备可以确定参考时间在其发送消息之前不能发生,也不能在接收到返回消息之后发生。 密码散列可用于防范恶意计算设备。 消息的替代路径和调度可用于在上限和下限之间提供较窄的扩展,并且可以通过增加随时间推移来计算时钟漂移。
    • 98. 发明授权
    • Suspension and reinstatement of reference handles
    • 暂停和恢复参考手柄
    • US07395331B2
    • 2008-07-01
    • US10966946
    • 2004-10-15
    • John R. DouceurYoram Bernet
    • John R. DouceurYoram Bernet
    • G06F15/16
    • G06F9/52
    • A handle administration system is described in which software agents receive handles to various resources that they can use to obtain the resources. The described embodiments provide multiple states that can be assumed by the handles. An unassigned state is provided in which handles are not assigned to a particular resource, nor can they be dereferenced to obtain pointers to any resources. An assigned state is provided in which handles are assigned to a particular resource and can be dereferenced to obtain a pointer to the resource. A suspended state is provided in which the handles are assigned to a particular resource but cannot be dereferenced to obtain a pointer to that resource. Advantageously, a suspended handle can be reinstated to assume the assigned state. In one embodiment, the handle system is implemented by incorporating a suitable field in a handle database that is used to indicate that a handle is suspended. In another embodiment, no additional fields are necessary. Rather, handle values in the handle database are manipulated to indicate that a handle has been suspended. These manipulations can be easily undone to reinstate a handle. In the described embodiment, a three state handle system can be advantageously employed to implement a two-phase commit operation.
    • 描述了一种处理管理系统,其中软件代理程序接收他们可以用来获取资源的各种资源的句柄。 所描述的实施例提供了可由手柄假定的多个状态。 提供了未分配状态,其中句柄未分配给特定资源,也不能被取消引用以获得指向任何资源的指针。 提供分配状态,其中将句柄分配给特定资源,并且可以被取消引用以获得指向资源的指针。 提供了一种挂起状态,其中将句柄分配给特定资源,但不能取消引用以获取指向该资源的指针。 有利地,可以恢复悬挂的手柄以呈现分配的状态。 在一个实施例中,通过在句柄数据库中合并用于指示句柄被暂停的适当字段来实现句柄系统。 在另一个实施例中,不需要附加字段。 相反,处理句柄数据库中的值被操纵以指示句柄已被挂起。 这些操作可以很容易地撤消以恢复句柄。 在所描述的实施例中,可以有利地采用三状态句柄系统来实现两阶段提交操作。
    • 100. 发明申请
    • File metadata lease management
    • 文件元数据租赁管理
    • US20080010282A1
    • 2008-01-10
    • US11482629
    • 2006-07-07
    • John R. DouceurJonathan R. Howell
    • John R. DouceurJonathan R. Howell
    • G06F17/30
    • G06F16/1767
    • Each file in a file system has one or more associated metadata fields, and each metadata field is associated with a different lease. A computing device sends a request to a directory server for one or more leases that are needed by the computing device to perform an operation on a file. The directory server receives the request from the computing device and determines whether the operation can succeed. One or more leases to perform the operation are issued to the computing device if it is determined that the operation can succeed, and one or more leases that reveal failure are issued to the computing device if it is determined that the operation cannot succeed. The computing device receives the issued lease(s) and uses the received lease(s) to determine whether the computing device can perform the operation on the file.
    • 文件系统中的每个文件具有一个或多个关联的元数据字段,并且每个元数据字段与不同的租约相关联。 计算设备向目录服务器发送计算设备需要的一个或多个租约以对文件执行操作的请求。 目录服务器从计算设备接收请求,并确定操作是否成功。 如果确定操作可以成功,则将一个或多个执行操作的租约发布到计算设备,并且如果确定操作不能成功,则向计算设备发出显示故障的一个或多个租约。 计算设备接收已发出的租约并使用接收到的租约来确定计算设备是否可以对文件执行操作。