会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Methods and apparatus for supporting persistent memory
    • 支持持久记忆的方法和装置
    • US09244839B2
    • 2016-01-26
    • US14125741
    • 2013-07-26
    • Intel Corporation
    • Sridharan SakthiveluRobert Bruce BahnsenGerrit Saylor
    • G06F12/08
    • G06F12/0804G06F12/126
    • A processing device features a processing unit, a memory management system, and persistent memory in a persistent memory domain. The processing device provides an enhanced write-back (WB-E) memory space for an application running on the processing unit. The memory management system maps the WB-E memory space to the persistent memory. The application creates WB-E data by executing an instruction to store data to an address in the WB-E memory space. The WB-E data is automatically stored in a cache associated with the processing unit in response to creation of the WB-E data by the application. In response to execution of a commit instruction by the application after the application has created WB-E data for multiple memory addresses, the memory management system automatically ensures that all of the WB-E data for the application has been saved to the persistent memory domain. Other embodiments are described and claimed.
    • 处理设备具有处理单元,存储器管理系统和持久存储器域中的持久存储器。 处理设备为在处理单元上运行的应用提供增强的回写(WB-E)存储器空间。 存储器管理系统将WB-E存储器空间映射到持久存储器。 应用程序通过执行将数据存储到WB-E存储空间中的地址的指令来创建WB-E数据。 响应于应用程序创建WB-E数据,WB-E数据自动存储在与处理单元相关联的缓存中。 在应用程序创建了多个内存地址的WB-E数据之后,响应于应用程序执行提交指令,内存管理系统自动确保应用程序的所有WB-E数据都已保存到持久内存域 。 描述和要求保护其他实施例。
    • 12. 发明授权
    • Installing and executing shared applications in shared folders
    • 在共享文件夹中安装和执行共享应用程序
    • US08645940B2
    • 2014-02-04
    • US13204475
    • 2011-08-05
    • Guohong XieBoon-Lock YeoGangJiang LiJun Wang
    • Guohong XieBoon-Lock YeoGangJiang LiJun Wang
    • G06F9/44
    • G06F8/61G06F2209/549
    • Provided are a method, system, and program for installing and executing shared applications in shared folders. A program is installed by a base computer, having a local storage, to a shared folder accessible to multiple client computers over a network. Installing the program adds files for the program to the shared folder and modifies the local device used by the base computer and enables the base computer to run the program by accessing the program files in the shared folder. An image is created of the local device of the base computer including the installed program. The image is provided to the client computers to apply to local devices of the client computers. Applying the image to the local devices of the client computers enables the client computers to access the program files in the shared folder to run the program.
    • 提供了一种用于在共享文件夹中安装和执行共享应用程序的方法,系统和程序。 由具有本地存储器的基本计算机将程序安装到通过网络可访问多个客户端计算机的共享文件夹。 安装程序将程序的文件添加到共享文件夹,并修改基本计算机使用的本地设备,并使基本计算机通过访问共享文件夹中的程序文​​件来运行程序。 创建包括安装程序在内的基本计算机的本地设备的映像。 图像被提供给客户端计算机以应用于客户端计算机的本地设备。 将映像应用到客户端计算机的本地设备可使客户端计算机访问共享文件夹中的程序文​​件以运行程序。
    • 13. 发明授权
    • Partially replicated, locally searched peer to peer file sharing system
    • 部分复制,本地搜索对等文件共享系统
    • US08645553B2
    • 2014-02-04
    • US12655420
    • 2009-12-29
    • Bradford H. NeedhamMark Lewis
    • Bradford H. NeedhamMark Lewis
    • G06F17/30
    • G06F17/30209G06F17/3002
    • Controlling access to a file includes selecting, by a first network node in a peer to peer file sharing system, a file to make available for sharing with a second network node in the peer to peer file sharing system, the file being stored on the first network node. The first network node sends index information associated with the selected file to the second network node. The second network node subsequently performs a local search of a set of index information associated with a set of files stored in the peer to peer file sharing system to locate the index information for the selected file; and requests a copy of the selected file from the first network node using the index information.
    • 控制对文件的访问包括由对等文件共享系统中的第一网络节点选择一个文件以使得可用于与对等文件共享系统中的第二网络节点共享,该文件被存储在第一 网络节点。 第一网络节点将与所选文件相关联的索引信息发送到第二网络节点。 第二网络节点随后对存储在对等文件共享系统中的与一组文件相关联的一组索引信息执行本地搜索,以定位所选择的文件的索引信息; 并使用索引信息从第一网络节点请求所选择的文件的副本。
    • 14. 发明授权
    • Method and apparatus for loading a trustable operating system
    • 用于加载可信任操作系统的方法和装置
    • US08407476B2
    • 2013-03-26
    • US12615519
    • 2009-11-10
    • Michael A. KozuchJames A. Sutton, IIDavid Grawrock
    • Michael A. KozuchJames A. Sutton, IIDavid Grawrock
    • H04L29/06
    • G06F9/45533G06F9/445G06F21/57G06F21/575G06F2009/45583G06F2009/45587
    • An article of manufacture is provided for securing a region in a memory of a computer. According to one embodiment, the article of manufacture comprises a machine-accessible medium including data that, when accessed by a machine, causes the machine to: halt all but one of a plurality of processing elements in a computer, where the halted processing elements enter into a special halted state; load content into the region only after the halting of all but the one of the plurality of processing elements and the region is protected from access by the halted processing elements; place the non-halted processing element into a known privileged state; and cause the halted processing elements to exit the halted state after the non-halted processing element has been placed into the known privileged state.
    • 提供了一种用于将区域固定在计算机的存储器中的制造物品。 根据一个实施例,制品包括机器可访问介质,其包括当由机器访问时使机器停止计算机中的多个处理元件中除了一个处理元件之外的所有其中停止的处理元件进入的数据 进入特殊的停止状态; 只有在除了多个处理元件中的一个处理元件之外的所有处理器停止之后才将内容加载到该区域中,并且该区域被保护以防止被暂停的处理元件的访问; 将未停止的处理元素置于已知的特权状态; 并且在非停止处理元件已经被置于已知的特权状态之后使得暂停的处理元件退出停止状态。
    • 15. 发明授权
    • Transparent failover support through pragmatically truncated progress engine and reversed complementary connection establishment in multifabric MPI implementation
    • 透明的故障切换支持通过实际截断的进度引擎和反向互补连接建立多重MPI实现
    • US08305883B2
    • 2012-11-06
    • US12383237
    • 2009-03-20
    • Alexander V. Supalov
    • Alexander V. Supalov
    • H04J1/16
    • G06F11/2012
    • A method, system, and computer program product containing instructions for establishing and maintaining multiple connections over different communication fabrics between two processes. The slowest, most reliable connection may be established first and then complemented by progressively faster connections between the same pair of processes. Each of these multiple connections is maintained throughout the duration of the communication session between the processes. These multiple connections may include connections made via network interfaces and, when available, direct connections such as a shared memory connection or a point-to-point processor interconnection. This connection strategy provides one or more failback communication paths that can be used with no startup costs in the event of failure of one of the other communication paths. These failback communication paths can be used to exchange failover protocol information needed to resend messages that were undelivered due to failure of one of the communication connections.
    • 一种方法,系统和计算机程序产品,其中包含用于在两个进程之间的不同通信结构上建立和维护多个连接的指令。 可以先建立最慢,最可靠的连接,然后通过在同一对进程之间逐步更快的连接进行补充。 这些多个连接中的每一个在进程之间的通信会话的持续时间内被维持。 这些多个连接可以包括通过网络接口进行的连接,并且当可用时,诸如共享存储器连接或点到点处理器互连之类的直接连接。 该连接策略提供一个或多个故障恢复通信路径,在其他通信路径之一的故障的情况下,可以不使用启动成本来使用。 这些故障恢复通信路径可用于交换由于其中一个通信连接故障而重新发送未传递的消息所需的故障切换协议信息。
    • 16. 发明授权
    • Methods and apparatus for dynamically adapting a virtual keyboard
    • 动态调整虚拟键盘的方法和装置
    • US09507519B2
    • 2016-11-29
    • US13994830
    • 2011-12-08
    • Aras BilgenJames Ketrenos
    • Aras BilgenJames Ketrenos
    • G06F3/048G06F3/0488G06F3/0485
    • G06F3/04886G06F3/0485
    • In one example embodiment, a mobile computing device displays at least part of an electronic form containing input objects to accept user input. A virtual keyboard module parses the form to discover attributes of the input objects and automatically determines whether the form includes a command button or other non-textual input object, based on results of the parsing. In response to discovering that the form includes a non-textual input object, the virtual keyboard module automatically adds a corresponding non-textual virtual keyboard component to a virtual keyboard, and the virtual keyboard module displays the virtual keyboard with the added non-textual virtual keyboard component on the display of the mobile device. The added non-textual virtual keyboard component may be configured to allow a user to invoke, from the virtual keyboard, a function associated with the corresponding non-textual input object in the form. Other embodiments are described and claimed.
    • 在一个示例性实施例中,移动计算设备显示包含输入对象的电子表单的至少一部分以接受用户输入。 虚拟键盘模块解析表单以发现输入对象的属性,并根据解析结果自动确定表单是否包含命令按钮或其他非文本输入对象。 响应于发现表单包括非文本输入对象,虚拟键盘模块自动将相应的非文本虚拟键盘组件添加到虚拟键盘,并且虚拟键盘模块显示虚拟键盘与添加的非文本虚拟 键盘组件在移动设备的显示器上。 所添加的非文本虚拟键盘组件可以被配置为允许用户从虚拟键盘调用与该表单中的相应非文本输入对象相关联的功能。 描述和要求保护其他实施例。
    • 19. 发明授权
    • Methods and apparatus for device authentication with one-time credentials
    • 具有一次凭证的设备认证方法和设备
    • US09215069B2
    • 2015-12-15
    • US13709646
    • 2012-12-10
    • Intel Corporation
    • Xiaoyu RuanXiaozhu Kang
    • H04K1/00H04L9/00H04L9/28H04L9/30H04L9/32
    • H04L9/32H04L9/3066H04L9/3218
    • An automated method for authenticating a proving device to a verifying device involves an elliptic curve formula (ECF) for a predetermined elliptic curve associated with a proving device. According to one example method, the prover sends the verifier a message containing a first proof value (P2). The verifier determines whether P2 is a point on the elliptic curve associated with the proving device. If P2 is not on the elliptic curve, the verifier may determine that the proving device should not be trusted. The message may further comprise a second proof value (K1), and the verifier may automatically determine whether K1 corresponds to P1, based on a previous point (P0) on the elliptic curve. If K1 does not correspond to P1, the verifier may determine that the proving device should not be trusted. Other embodiments are described and claimed.
    • 用于将验证装置验证到验证装置的自动化方法涉及用于与证明装置相关联的预定椭圆曲线的椭圆曲线公式(ECF)。 根据一个示例性方法,证明者向验证者发送包含第一验证值(P2)的消息。 验证者确定P2是否是与证明设备相关联的椭圆曲线上的点。 如果P2不在椭圆曲线上,则验证者可以确定证明设备不应被信任。 消息还可以包括第二证明值(K1),并且验证者可以基于椭圆曲线上的先前点(P0)自动确定K1是否对应于P1。 如果K1不对应于P1,则验证者可以确定证明设备不应被信任。 描述和要求保护其他实施例。