会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明申请
    • On-Board Vehicle Computer System
    • 车载计算机系统
    • US20090144622A1
    • 2009-06-04
    • US11947175
    • 2007-11-29
    • David K. EvansVishakha RadiaMichael A. Caponigro
    • David K. EvansVishakha RadiaMichael A. Caponigro
    • G06F3/048G01C21/00
    • G01C21/00G06F3/04886
    • In one embodiment, an apparatus includes a touch-screen display. The apparatus includes first logic for generating a virtual assistant for presentation to a user via the touch-screen display. The virtual assistant has one or more anthropomorphic characteristics and interacts with the user via at least the touch-screen display to facilitate user access to one or more vehicle features. The apparatus includes second logic for automatically receiving data from a radio-frequency identification (RFID) tag in a personal item of the user to identify the user, automatically accessing a profile associated with the RFID tag, and automatically initiating implementation of one or more of preferences of the user indicated by a profile associated with the RFID tag. The apparatus includes a vehicle interface for coupling the apparatus to any one of multiple vehicles and communicating data between the first or second logic and the vehicle.
    • 在一个实施例中,一种装置包括触摸屏显示器。 该装置包括用于生成虚拟助理以用于经由触摸屏显示呈现给用户的第一逻辑。 虚拟助理具有一个或多个人形特征,并且至少通过触摸屏显示与用户交互,以便于用户访问一个或多个车辆特征。 该装置包括用于自动从用户个人物品中的射频识别(RFID)标签接收数据的第二逻辑,以识别用户,自动访问与RFID标签相关联的简档,以及自动地启动一个或多个 由与RFID标签相关联的简档指示的用户偏好。 该装置包括用于将装置耦合到多个车辆中的任何一个并在第一或第二逻辑与车辆之间传送数据的车辆接口。
    • 13. 发明授权
    • Apparatus and methods for caching objects using main memory and persistent memory
    • 用于使用主存储器和持久存储器缓存对象的装置和方法
    • US07269608B2
    • 2007-09-11
    • US10137443
    • 2002-05-03
    • Thomas K. WongPanagiotis TsirigotisSanjay R. RadiaRajeev ChawlaOmid Ahmadian
    • Thomas K. WongPanagiotis TsirigotisSanjay R. RadiaRajeev ChawlaOmid Ahmadian
    • G06F17/30
    • G06F11/1435G06F12/123Y10S707/99942Y10S707/99952
    • An object cache stores objects in a cyclic buffer to provide highly efficient creation of cache entries. The cache efficiently manages storage of a large number of small objects because the cache does not write objects into a file system as individual files, rather the cache utilizes cyclical buffers in which to store objects as they are added to the cache. Because of the use of a cyclic buffer, the high-overhead process of purging cache entries never needs to be performed. Cache entries are automatically purged as they are overwritten when the cyclic buffer becomes full and the input pointer wraps around from the end of a cyclic buffer to the beginning of a cyclic buffer. Additionally, in the event of a system crash or disk subsystem malfunction, inspect and repair time is independent of the size of the cache, as opposed to conventional file systems in which the time is proportional to the size of the file system.
    • 对象缓存将对象存储在循环缓冲区中以提供高效创建缓存条目。 高速缓存有效地管理大量小对象的存储,因为高速缓存不将对象作为单个文件写入文件系统,而是缓存使用循环缓冲区来存储被添加到高速缓存中的对象。 由于使用循环缓冲区,因此不需要执行清除高速缓存条目的高开销过程。 当循环缓冲器变满并且输入指针从循环缓冲器结束循环到循环缓冲器的开始时,缓存条目被自动清除,因为它们被重写。 另外,在系统崩溃或磁盘子系统发生故障的情况下,检查和修复时间与缓存的大小无关,与传统的文件系统相比,文件系统的时间与文件系统的大小成正比。
    • 14. 发明申请
    • Automated deployment and configuration of applications in an autonomically controlled distributed computing system
    • 在自动控制的分布式计算系统中自动部署和配置应用程序
    • US20070168919A1
    • 2007-07-19
    • US11607819
    • 2006-12-01
    • David HenselerJeanne OhrenSanjay Radia
    • David HenselerJeanne OhrenSanjay Radia
    • G06F9/44
    • G06F9/5027G06F8/61G06F2209/5011G06F2209/508
    • A distributed computing system conforms to a multi-level, hierarchical organizational model. One or more control nodes provide for the efficient and automated allocation and management of computing functions and resources within the distributed computing system in accordance with the organization model. A user, such as a system administrator, interacts with the control nodes to logically define the hierarchical organization of distributed computing system. The control node includes an automation subsystem having one or more rule engines that provide autonomic control of the application nodes in accordance with a set of one or more rules. A pluggable, application-specific application governor is selected and installed within the control node to provide an application-independent interface through which the rule engines interact to control the deployment, execution and monitoring of the applications within the distributed computing system. The application governor uses a set of application image objects to configure an application on an application node. Each of the application image objects share a common interface and are therefore interchangeable.
    • 分布式计算系统符合多层次的组织模式。 一个或多个控制节点根据组织模型提供分布式计算系统内的计算功能和资源的有效和自动化的分配和管理。 诸如系统管理员的用户与控制节点进行交互以逻辑地定义分布式计算系统的分层组织。 控制节点包括具有一个或多个规则引擎的自动化子系统,该规则引擎根据一个或多个规则的集合提供应用节点的自主控制。 在控制节点内选择并安装可插拔的特定于应用程序的调试器,以提供独立于应用程序的接口,规则引擎将通过该接口进行交互,以控制分布式计算系统内的应用程序的部署,执行和监控。 应用程序调节器使用一组应用程序映像对象来配置应用程序节点上的应用程序。 每个应用程序映像对象共享一个公共接口,因此可以互换。
    • 15. 发明授权
    • Method and apparatus for facilitating use of a pre-shared secret key with identity hiding
    • 便于使用具有身份隐藏的预共享秘密密钥的方法和装置
    • US06975729B1
    • 2005-12-13
    • US09640465
    • 2000-08-15
    • Radia J. Perlman
    • Radia J. Perlman
    • H04L9/08H04L29/06
    • H04L9/0841H04L63/0407H04L63/061H04L2209/16
    • One embodiment of the present invention provides a system that facilitates a key exchange that operates with a pre-shared secret key and that hides identities of parties involved in the key exchange. The method operates by establishing a negotiated secret key between a first party and a second party by performing communications between the first party and the second party across a network in a manner that does not allow an eavesdropper to determine the negotiated secret key. Next, the system encrypts an identifier for the first party using the negotiated secret key and a group secret key to form an encrypted identifier. This group secret key is known to members of a group, including the first party and the second party, but is kept secret from parties outside of the group. Next, the system sends the encrypted identifier from the first party across the network to the second party. This allows the second party to decrypt the encrypted identifier by using the negotiated secret key and the group secret key, so that the second party can use the identifier to lookup the pre-shared secret key that was previously established between the first party and the second party. This pre-shared secret key is subsequently used in forming at least one subsequent communication between the first party and the second party.
    • 本发明的一个实施例提供了一种系统,其有助于利用预共享秘密密钥进行密钥交换并隐藏密钥交换中涉及的各方的身份的系统。 该方法通过以不允许窃听者确定协商的秘密密钥的方式通过网络执行第一方和第二方之间的通信来在第一方和第二方之间建立协商的秘密密钥来操作。 接下来,系统使用协商的秘密密钥和组密钥对第一方的标识符进行加密,以形成加密的标识符。 该组秘密密钥是包括第一方和第二方在内的组的成员所知道的,但是对该组之外的各方保密。 接下来,系统将加密的标识符从第一方通过网络发送到第二方。 这允许第二方通过使用协商的秘密密钥和组密钥来解密加密的标识符,使得第二方可以使用标识符来查找先前在第一方和第二方之间建立的预共享密钥 派对。 该预共享密钥随后用于形成第一方和第二方之间的至少一个后续通信。
    • 16. 发明授权
    • Dynamic LAN boundaries
    • 动态LAN边界
    • US06901076B2
    • 2005-05-31
    • US09726800
    • 2000-11-30
    • Radia J. PerlmanEric A. Guttman
    • Radia J. PerlmanEric A. Guttman
    • H04L12/46H04L12/28H04L12/56
    • H04L12/4625
    • A network device dynamically switches between layer 2 (data link) operation and layer 3 (network) operation. When enabled, bridging logic functions as a data link bridge, receiving data link messages from communications links forming part of a single network-layer segment and forwarding the messages to another communications link using layer-2 addresses in the messages. When enabled, routing logic functions as a network router, receiving network layer messages from different network-layer segments and forwarding the messages to other links based on a routing algorithm and the network layer addresses. Selection logic dynamically selects the desired function under different operating conditions. For a transition from router to bridge, multiple network-layer segments are merged into a single bridged network-layer segment, freeing up link numbers for use in configuring addresses for other segments. For the transition from bridge to router, a single bridged network-layer segment is divided into multiple segments having distinct routing identities.
    • 网络设备在层2(数据链路)操作和第3层(网络)操作之间动态切换。 当启用时,桥接逻辑用作数据链桥,从形成单个网络层段的一部分的通信链路接收数据链路消息,并使用消息中的二层地址将消息转发到另一通信链路。 启用后,路由逻辑作为网络路由器,从不同的网络层接收网络层消息,并根据路由算法和网络层地址将消息转发到其他链路。 选择逻辑在不同的操作条件下动态地选择所需的功能。 对于从路由器到桥接的过渡,多个网络层段被合并到单个桥接网络层段中,释放用于配置其他段的地址的链路号。 对于从桥到路由器的过渡,单个桥接网络层段被划分成具有不同路由标识的多个段。
    • 17. 发明申请
    • Blinded encryption and decryption
    • 盲加密解密
    • US20050066174A1
    • 2005-03-24
    • US10664799
    • 2003-09-18
    • Radia Perlman
    • Radia Perlman
    • H04L9/30H04L9/00
    • H04L9/3006H04L2209/04H04L2209/76
    • A method and system for utilizing and encryption or decryption agent so as to preclude access by the encryption agent or decryption agent, respectively, to the information being encrypted or decrypted. To preclude access by the encryption agent, a blinding function is applied to the information prior to forwarding such information to the encryption agent for encryption. To preclude access to the information by the decryption agent, a blinding function is applied to the encrypted information prior to forwarding the encrypted information to the decryption agent for decryption. Once the information has been returned, the information is unblinded, leaving an encrypted or decrypted message respectively.
    • 一种用于利用和加密或解密代理以便分别由加密代理或解密代理人访问被加密或解密的信息的方法和系统。 为了防止加密代理的访问,在将这些信息转发到加密代理进行加密之前,将盲目的功能应用于信息。 为了防止解密代理访问信息,在将加密信息转发到解密代理进行解密之前,将加密信息应用于加密信息。 一旦信息被返回,信息就被解除隐藏,分别留下加密或解密的消息。
    • 18. 发明授权
    • Use of beacon message in a network for classifying and discarding messages
    • 在网络中使用信标消息来分类和丢弃消息
    • US06658004B1
    • 2003-12-02
    • US09473402
    • 1999-12-28
    • Miriam C. KadanskyDah Ming ChiuStephen R. HannaStephen A. HurstRadia J. PerlmanJoseph S. Wesley
    • Miriam C. KadanskyDah Ming ChiuStephen R. HannaStephen A. HurstRadia J. PerlmanJoseph S. Wesley
    • H04L1228
    • H04L12/1827H04L47/10H04L47/31H04L67/104H04L67/1063H04L67/1074H04L69/329
    • A method and apparatus for identifying a data message that is eligible for discard. A beacon node periodically transmits a beacon message to a plurality of client nodes communicatively coupled via a network. Each beacon message includes a beacon sequence number and preferably, the beacon sequence numbers are authenticated by the beacon, node. The client nodes, upon receipt of the beacon messages, verify the authenticity of the respective received beacon sequence numbers and generate a local sequence number derived from the received beacon sequence number. When one client in the session has data to transmit to another client in the session, the sending client assembles a data message and inserts its local sequence number in the data message prior to transmission of the data message to the other client nodes in the session. The client nodes receiving the data message discard the data message if their respective local sequence number at the time of receipt of the data message exceeds the local sequence number inserted in the data message by a predetermined value. In one embodiment, the beacon node generates sequence numbers at a periodic interval P but only transmits 1 out of every m beacon sequence numbers to the client nodes in the session. The client nodes each set a local sequence counter equal to the beacon sequence number upon receipt of the beacon message and thereafter, increment the local sequence counter periodically at interval P. The local sequence counter value is employed as the local sequence number in each client node.
    • 一种用于识别符合丢弃资格的数据消息的方法和装置。 信标节点周期性地向经由网络通信耦合的多个客户端节点发送信标消息。 每个信标消息包括信标序列号,并且优选地,信标序列号由信标节点认证。 客户端节点在接收到信标消息后,验证相应接收到的信标序列号的真实性,并生成从接收到的信标序列号导出的本地序列号。 当会话中的一个客户端具有要在会话中传送给另一个客户端的数据时,发送客户端汇集一个数据消息,并将数据消息中的本地序列号插入到数据消息中,并传送到该会话中的其他客户机节点。 接收数据消息的客户节点如果在接收数据消息时其各自的本地序列号超过插入数据消息中的本地序列号预定值,则丢弃数据消息。 在一个实施例中,信标节点以周期性间隔P生成序列号,但是仅在每个m个信标序列号中发送1个到会话中的客户端节点。 客户端节点每接收到信标消息时都设置等于信标序列号的本地序列计数器,此后,以间隔P周期性地增加本地序列计数器。本地序列计数器值被用作每个客户端节点中的本地序列号 。
    • 19. 发明授权
    • Content screening with end-to-end encryption prior to reaching a destination
    • 在到达目的地之前进行端到端加密的内容筛选
    • US06560705B1
    • 2003-05-06
    • US09511541
    • 2000-02-23
    • Radia J. PerlmanStephen R. HannaYassir K. Elley
    • Radia J. PerlmanStephen R. HannaYassir K. Elley
    • H04L936
    • H04L63/0209H04L63/0442H04L63/1408
    • One embodiment of the present invention provides a system that performs content screening on a message that is protected by end-to-end encryption. The system operates by receiving an encrypted message and an encrypted message key at a content screener from a firewall, the firewall having previously received the encrypted message and the encrypted message key from a source outside the firewall. The content screener decrypts the encrypted message key to restore the message key, and decrypts the encrypted message with the message key to restore the message. Next, the content screener screens the message to determine whether the message satisfies a screening criterion. If so, the system forwards the message to a destination within the firewall in a secure manner. In one embodiment of the present invention, the system decrypts the encrypted message key by sending the encrypted message key to the destination. Upon receiving the encrypted message key, the destination decrypts the encrypted message key and returns the message key to the content screener in a secure manner.
    • 本发明的一个实施例提供一种对通过端到端加密保护的消息执行内容筛选的系统。 该系统通过从防火墙在内容筛选器处接收加密消息和加密消息密钥来操作,防火墙先前从防火墙外部的源接收到加密消息和加密消息密钥。 内容筛选器解密加密的消息密钥以恢复消息密钥,并用消息密钥解密加密的消息以恢复消息。 接下来,内容筛选器筛选消息以确定消息是否满足筛选标准。 如果是这样,系统会以安全的方式将消息转发到防火墙内的目的地。 在本发明的一个实施例中,系统通过将加密的消息密钥发送到目的地来解密加密的消息密钥。 在接收到加密的消息密钥时,目的地解密加密的消息密钥,并以安全的方式将消息密钥返回给内容筛选器。