会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明授权
    • Push voicemail via “always on”
    • 通过“始终开启”来推送语音信箱
    • US08175232B2
    • 2012-05-08
    • US12060226
    • 2008-03-31
    • Howard J. LockerJames S. RutledgeJames J. ThrasherMichael T. Vanover
    • Howard J. LockerJames S. RutledgeJames J. ThrasherMichael T. Vanover
    • H04M1/64
    • H04M1/64
    • Solutions which address a growing and compelling need recognized in connection with rendering VOIP systems on laptops, or even on other mobile devices, even more versatile and user-friendly so as to even better replicate the advantages of cell phones. Broadly contemplated herein two modes of network access and two modes of user interface, which modes can be combined in any way as deemed suitable or appropriate. Preferably, a commonality between the contemplated network access and user interface modes is the use of a low-powered secondary processor, a secondary operating system, and non volatile storage applications which could be networking applications (e.g., an Always On subsystem).
    • 与在笔记本电脑上甚至是其他移动设备上呈现VOIP系统相关的解决方案正在不断增长和引人注目的需求,解决方案更加通用和用户友好,从而更好地复制了手机的优势。 本文广泛地考虑了两种模式的网络访问和两种用户界面模式,哪些模式可以被认为合适或合适地以任何方式组合。 优选地,预期的网络访问和用户界面模式之间的共同性是使用可以是网络应用(例如,永远在子系统)的低功率辅助处理器,辅助操作系统和非易失性存储应用。
    • 13. 发明授权
    • Method for controlling file access on computer systems
    • 控制计算机系统文件访问的方法
    • US08086873B2
    • 2011-12-27
    • US11446737
    • 2006-06-05
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • G06F12/14
    • G06F12/1475G06F21/78
    • A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
    • 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。
    • 17. 发明申请
    • Hypervisor control of power and thermal for client systems
    • 管理程序控制客户端系统的电源和散热
    • US20070234360A1
    • 2007-10-04
    • US11394654
    • 2006-03-31
    • Howard J. LockerDaryl CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl CromerRandall S. SpringfieldRod D. Waltermann
    • G06F9/46
    • G06F11/3058G06F1/206G06F1/3203G06F11/301
    • Hypervisors are a new technology in the industry that enable multiple Operating Systems to co-exist on a single client. The use of a hypervisor provides a novel approach to thermal fan control. The hypervisor is able to fire up a maintenance Operating System on demand or have it running from the powering of the computer. The maintenance Operating System continuously monitors the status of the user Operating System and determines if the system is within the desired fan noise profile by measuring noise levels using means well known in the art. If the system seems to be drifting out of the desired profile, the maintenance Operating System will determine what type of action is required and choose the most appropriate course of action. These actions can be performed by either the maintenance Operating System or the hypervisor, as appropriate.
    • 管理程序是行业中的一项新技术,可使多个操作系统在单个客户端上共存。 使用管理程序提供了一种新型的风扇控制方法。 管理程序能够根据需要启动维护操作系统,或者从计算机的电源运行。 维护操作系统通过使用本领域熟知的手段测量噪声水平来连续地监视用户操作系统的状态并确定系统是否在期望的风扇噪声分布内。 如果系统似乎从所需的配置文件中漂移出来,维护操作系统将确定需要哪种类型的操作,并选择最合适的操作步骤。 这些操作可以由维护操作系统或管理程序根据需要执行。
    • 18. 发明授权
    • Computer system and method to disable same when network cable is removed
    • 删除网线时,计算机系统和方法禁用相同
    • US6026492A
    • 2000-02-15
    • US965341
    • 1997-11-06
    • Daryl C. CromerHoward J. LockerErnest Nelson MandeseJames Peter Ward
    • Daryl C. CromerHoward J. LockerErnest Nelson MandeseJames Peter Ward
    • G08B21/00
    • G08B13/1418G06F21/88G06F2221/2143
    • Described is a computer system which is coupled to a remote computer via a network cable. The computer system has a normally closed enclosure and is capable of securing data retained within the system against unauthorized access. The computer system includes an erasable memory element mounted within the enclosure for selective activation to active and inactive states and for receiving and storing a security password when in the active state. A manually operable option switch is mounted within the enclosure. The option switch is operatively connected with the erasable memory element and manually settable by a user of the computer system for setting the erasable memory element to the active and inactive states. A cable removal detector is coupled to the enclosure and is operatively connected with the erasable memory element for detecting a disconnection of the cable and for clearing any stored security password from the erasable memory element in response to any switching of the cable removal detector between a first state and a second state.
    • 描述了经由网络电缆耦合到远程计算机的计算机系统。 计算机系统具有常闭外壳,并且能够保护系统中保留的数据,防止未经授权的访问。 计算机系统包括安装在机箱内的可擦除存储器元件,用于选择性地激活到主动和非活动状态,并且在处于活动状态时接收和存储安全密码。 手动可操作的选项开关安装在外壳内。 选项开关可操作地与可擦除存储元件连接,并且可由计算机系统的用户手动设置,用于将可擦除存储器元件设置为活动状态和非活动状态。 电缆去除检测器耦合到外壳并且与可擦除存储器元件可操作地连接,用于检测电缆的断开并且用于响应于电缆去除检测器在第一和第二电缆之间的任何切换而从可擦除存储器元件中清除所存储的安全密码 状态和第二状态。
    • 19. 发明授权
    • Computer system for sending an alert signal over a network when a cover
of said system has been opened
    • 用于当所述系统的盖已经打开时通过网络发送报警信号的计算机系统
    • US5945915A
    • 1999-08-31
    • US965140
    • 1997-11-06
    • Daryl C. CromerThi N. DangJan M. JanickHoward J. LockerDavid Rhoades
    • Daryl C. CromerThi N. DangJan M. JanickHoward J. LockerDavid Rhoades
    • G06F1/18G06F21/00G08B29/04G08B21/00
    • G06F21/86G06F1/181G08B29/046G06F2221/2143
    • Described is a computer system which is coupled to a remote computer via a network cable. The computer system has a normally closed enclosure and is capable of securing data retained within the system against unauthorized access and notifying the remote computer when an unauthorized access has occurred. The computer system includes an erasable memory element mounted within the enclosure for selective activation to active and inactive states and for receiving and storing a security password when in the active state. A manually operable option switch is mounted within the enclosure. The option switch is manually settable by a user of the computer system for setting the memory element to the active and inactive states. A tamper detection switch is mounted within the enclosure and operatively connected with the memory element for detecting opening of the enclosure and for generating a tamper alert signal and clearing any stored security password from the memory element in response to any switching of the tamper switch. The computer system further includes a network connector which is operative to receive the tamper alert signal and upon so receiving, transmit an alert packet over the communication line to the remote computer. The alert packet contains an alert message and information which specifically identifies the computer system.
    • 描述了经由网络电缆耦合到远程计算机的计算机系统。 计算机系统具有常闭外壳,并且能够保护系统中保留的数据免遭未经授权的访问,并且在未经授权的访问发生时通知远程计算机。 计算机系统包括安装在机箱内的可擦除存储器元件,用于选择性地激活到主动和非活动状态,并且在处于活动状态时接收和存储安全密码。 手动可操作的选项开关安装在外壳内。 选项开关由计算机系统的用户手动设置,用于将存储器元件设置为活动状态和非活动状态。 篡改检测开关安装在外壳内并与存储元件可操作地连接,用于检测外壳的打开,并响应于篡改开关的任何切换,产生篡改警报信号并从存储元件中清除任何存储的安全密码。 计算机系统还包括网络连接器,其可操作以接收篡改警报信号,并且在接收时,通过通信线路向远程计算机发送警报包。 警报包包含警报消息和专门识别计算机系统的信息。