会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 92. 发明授权
    • Mapping between anonymous modules in a network environment
    • 映射网络环境中的匿名模块
    • US07693807B2
    • 2010-04-06
    • US11304298
    • 2005-12-15
    • Christopher G. KalerRichard L. Hasha
    • Christopher G. KalerRichard L. Hasha
    • G06N5/00G06F17/00
    • G06F9/546
    • The present invention extends to methods, systems, and computer program products for mapping between anonymous modules in an event environment. Through the use of one or more event type to executable module bindings, a binding/dispatch manager maps events, for example, peer-to-peer, grid, or parallel processing computing events, to appropriate methods for processing the events. When an event is received from an event infrastructure, the binding/dispatch manager refers to annotations (e.g., based on the shape of the parameters) to identify an appropriate method for processing the event. Parameters are transferred to the appropriate method, which processes the parameters and returns any results to the binding/dispatch manager. In some embodiments, the binding/dispatch manager then forwards a response to the event infrastructure.
    • 本发明扩展到用于在事件环境中的匿名模块之间进行映射的方法,系统和计算机程序产品。 通过将一个或多个事件类型用于可执行模块绑定,绑定/分派管理器将事件(例如,对等,网格或并行处理计算事件)映射到用于处理事件的适当方法。 当从事件基础设施接收到事件时,绑定/调度管理器引用注释(例如,基于参数的形状)来标识用于处理事件的适当方法。 参数传递到适当的方法,该方法处理参数并将任何结果返回给绑定/调度管理器。 在一些实施例中,绑定/调度管理器然后将响应转发到事件基础设施。
    • 94. 发明授权
    • Hidden proactive replication of data
    • 隐藏主动复制数据
    • US07631359B2
    • 2009-12-08
    • US10289988
    • 2002-11-06
    • Luis Felipe CabreraMarvin M. TheimerChristopher G. Kaler
    • Luis Felipe CabreraMarvin M. TheimerChristopher G. Kaler
    • G06F21/00H04L9/00
    • G06F21/6272
    • Moving replicas in a cryptographically secure manner such that the target location and timing of the movements are completely hidden from any user, or is kept as a secret by a limited number of users who have been given advanced notice of the new location and relocation time for a replica. A catalog of replica locations that describe the current location of the replicas is stored in encrypted form so as to prevent individuals from determining the exact location of the replicas. Since the location of the replicas is hidden at any given moment, attackers may not use the location of the replicas in order to attack all of the replicas at the same time. Accordingly, recovery mechanisms may have an opportunity to recover from any given attack by once again creating replicas from those replicas that had not been attacked.
    • 以加密安全的方式移动副本,使得移动的目标位置和定时完全被任何用户隐藏,或者被有限数量的用户保持为秘密,这些用户被提前通知新位置和重定位时间 一个副本。 描述副本的当前位置的副本位置的目录以加密形式存储,以防止个人确定副本的确切位置。 由于副本的位置在任何给定的时刻被隐藏,所以攻击者可能不会使用副本的位置来同时攻击所有的副本。 因此,恢复机制可能有机会从任何给定的攻击中恢复,从而再次从未受到攻击的副本创建副本。
    • 98. 发明申请
    • MULTIPLE PEER GROUPS FOR EFFICIENT SCALABLE COMPUTING
    • 用于高效计算的多个对等体组
    • US20080080530A1
    • 2008-04-03
    • US11536984
    • 2006-09-29
    • Christopher G. Kaler
    • Christopher G. Kaler
    • H04L12/56
    • H04L67/104G06F9/5061G06F2209/505H04L67/1042H04L67/1059
    • Multiple peer groups for performing computing, communication, and/or storage tasks. A method may be performed for example, in a computing environment including one or more agents networked together. The method includes providing data to the agents using two or more distinct peer groups. The peer groups include members from among the agents. The method further includes performing at each of the peer groups operations on the data. Each peer group is configured to perform a specific operation. The method also includes coordinating the operations at each of the peer groups such that a common computing, communication and/or storage task is accomplished by aggregating the operations at each of the peer groups.
    • 用于执行计算,通信和/或存储任务的多个对等组。 例如,可以在包括联网在一起的一个或多个代理的计算环境中执行方法。 该方法包括使用两个或多个不同对等体组向代理提供数据。 同行群体包括代理商中的成员。 该方法还包括在每个对等体组上对数据执行操作。 每个对等体组被配置为执行特定的操作。 该方法还包括协调每个对等体组的操作,使得通过聚合每个对等体组的操作来实现公共计算,通信和/或存储任务。
    • 100. 发明授权
    • Project-based configuration management method and apparatus
    • 基于项目的配置管理方法和设备
    • US07251655B2
    • 2007-07-31
    • US10851885
    • 2004-05-21
    • Christopher G. KalerSteven J. KruyMartyn S. LovellMichael J. Grier
    • Christopher G. KalerSteven J. KruyMartyn S. LovellMichael J. Grier
    • G06F17/30
    • G06F8/71Y10S707/99939Y10S707/99942Y10S707/99953Y10S707/99954
    • A configuration management system creates (602) each configuration by assigning a configuration identifier to each configuration. In addition, relational information is computed (706) that indicates the relationships between the configuration and any configurations upon which it is based. The system then tracks (604) changes to files of the configuration by storing information associating each new file version with the configuration identifier. The system also tracks (1210) changes to file properties. A configuration is then reconstructed (608) as of a desired date, by identifying (2104, 2106) the file versions and properties associated with that configuration as of the desired date. A determination is made (2110) whether a user that has requested the file versions has access privileges by first checking a security cache (2600) for the user privileges information. If the information is not on the cache, it is computed from a security table (2800) and stored on the cache. The system automatically compresses (3118) and reconstitutes (3006) file versions that are stored in the version store.
    • 配置管理系统通过为每个配置分配配置标识符来创建(602)每个配置。 另外,计算关系信息(706),其指示配置和基于其的任何配置之间的关系。 然后,系统通过存储将每个新文件版本与配置标识符相关联的信息来跟踪(604)对配置文件的更改。 系统还跟踪(1210)文件属性的更改。 然后,通过根据期望日期识别(2104,2106)与该配置相关联的文件版本和属性,从而将所需日期重新构建(608)。 (2110)通过首先检查用户权限信息的安全缓存(2600),确定已请求文件版本的用户是否具有访问权限。 如果信息不在缓存上,则从安全表(2800)计算并存储在缓存中。 系统自动压缩存储在版本存储中的(3118)和重构(3006)文件版本。