会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Systems and methods for tracking portions of a logical volume that have never been written by a host
    • 用于跟踪从未由主机写入的逻辑卷的部分的系统和方法
    • US08006052B1
    • 2011-08-23
    • US11487439
    • 2006-07-17
    • Zvi Gabriel BenhanokhMichael J. ScharlandRan Margalit
    • Zvi Gabriel BenhanokhMichael J. ScharlandRan Margalit
    • G06F12/00G06F11/00G06F17/30
    • G06F11/1451Y10S707/99955
    • Embodiments of the invention exploit the fact that not all portions of a logical volume may include data written by a host. Accordingly, an embodiment of the invention includes setting a designated set of bits to 1 in a meta data table when a logical volume is initialized. These bits may be referred to herein as Never Written by Host (NWBH) bits. Separately, or in combination, an embodiment of the invention includes setting a NWBH bit to 0 when data is written to the associated portion of the logical volume. Separately, or in combination, an embodiment of the invention includes reading the NWBH bit upon receiving a read command associated with the associated portion of the logical volume. If the NWBH bit is equal to 1, data is not read from the associated portion of the logical volume; if the NWBH bit is equal to 0, data is read from the associated portion of the logical volume.
    • 本发明的实施例利用了逻辑卷的并非所有部分可以包括由主机写入的数据的事实。 因此,本发明的实施例包括当逻辑卷被初始化时,在元数据表中设置指定的一组位。 这些位在本文中可以被称为从不由主机(NWBH)位写入。 单独地或组合地,本发明的实施例包括当数据被写入逻辑卷的关联部分时将NWBH位设置为0。 单独地或组合地,本发明的实施例包括在接收到与逻辑卷的相关部分相关联的读取命令时读取NWBH位。 如果NWBH位等于1,则不从逻辑卷的相关部分读取数据; 如果NWBH位等于0,则从逻辑卷的相关部分读取数据。
    • 13. 发明申请
    • METHODS AND SYSTEMS FOR RECOVERING META-DATA IN A CACHE MEMORY AFTER A CORRUPTION EVENT
    • 破坏活动后的缓存记录中的元数据的方法和系统
    • US20080126841A1
    • 2008-05-29
    • US11563467
    • 2006-11-27
    • Zvi Gabriel BenhanokhMatthew IvesterRan Margalit
    • Zvi Gabriel BenhanokhMatthew IvesterRan Margalit
    • G06F11/08
    • G06F11/1064
    • A method for recovering meta-data that has been subjected to corruption is disclosed for a cache memory. Each table entry in the cache memory has an in-cache indicator for indicating whether the data unit associated therewith is stored in a cache-slot in the cache memory. A first review is conducted of the table entries for identifying in-cache table entries (those that are associated with cache-slots in the cache memory), performing a correction attempt to ensure that the meta-data in an in-cache table entry are validated and corrected, if necessary, and ensuring that the in-cache indicator is set for an in-cache table entry. A second review is conducted of the table entries to ensure that the in-cache indicator is not set for any table entry that is not an in-cache table entry or for any in-cache table entry for which the correction attempt was unsuccessful.
    • 公开了一种用于恢复已经遭受破坏的元数据的方法用于高速缓冲存储器。 高速缓冲存储器中的每个表条目具有用于指示与其相关联的数据单元是否被存储在高速缓存存储器中的高速缓冲存储器时隙中的高速缓存指示符。 对用于识别缓存中的表条目(与高速缓冲存储器中的高速缓存存储器相关联的那些条目)的条目进行第一次审查,执行校正尝试以确保高速缓存表条目中的元数据是 验证和更正,如果需要,并确保为缓存中的表项设置缓存内指示符。 对表条目进行第二次审查,以确保不对任何不是缓存中表项的表条目设置缓存中的指示符,或者对于校正尝试不成功的任何缓存中的表项。
    • 16. 发明申请
    • AUTOMATED PURCHASING SYSTEM
    • 自动采购系统
    • US20130284806A1
    • 2013-10-31
    • US13656534
    • 2012-10-19
    • Ran Margalit
    • Ran Margalit
    • G06Q30/06G01G19/414
    • G06Q30/06G01G19/414G07G1/0009
    • Disclosed is an automated purchasing system that utilizes wireless purchaser identifier weight sensing shelves that wirelessly communicate with a store server. Purchasers can utilize a wireless identifier that may comprise an RFID or NFC device, such as a smart phone or tablet computer, which is placed in front of the weight sensing shelf and identifies the purchaser. The purchaser can then remove products from the shelves and the store server keeps track of the items removed. The automated purchasing system eliminates the costly and time consuming checkout process in various stores, such as grocery stores, department stores, hardware stores and other similar stores. Locked compartments and access portals can also be accessed. Also disclosed is a weight measuring hanger that comprises a hanger rod. The hanger rod employs a weight sensor that is sufficiently sensitive to detect the removal or addition of a product from the hanger rod.
    • 公开了一种自动采购系统,其利用与商店服务器无线通信的无线购买者标识符权重感知货架。 购买者可以使用无线标识符,其可以包括RFID或NFC设备,例如智能电话或平板计算机,其被放置在重量检测架的前面并识别购买者。 购买者可以从货架上取出产品,商店服务器跟踪已删除的物品。 自动化采购系统消除了各种商店(如杂货店,百货公司,五金店和其他类似商店)的昂贵且耗时的结帐流程。 也可以访问锁定的隔间和访问门户。 还公开了一种包括衣架杆的重量测量衣架。 衣架杆采用足够敏感的重量传感器,以检测从衣架杆移除或添加产品。
    • 20. 发明申请
    • SYSTEM AND METHOD FOR PREVENTING UNAUTHORIZED CONTACT OF APPLICANTS
    • 防止未经授权接触的系统和方法
    • US20090192889A1
    • 2009-07-30
    • US12021779
    • 2008-01-29
    • Andrew LukesRan Margalit
    • Andrew LukesRan Margalit
    • G06Q30/00G06Q99/00
    • G06Q30/018G06Q30/02G06Q30/0212G06Q30/0234
    • A system and method for preventing unauthorized use of sales leads. Application information is gathered from an applicant after the applicant views an Internet ad or other advertisement. The application information may include the applicant's e-mail address and phone number. At least one pseudo e-mail address or phone number is then created that identifies at least some of the application information and a potential purchaser of the application information. A unique pseudo e-mail address or phone number is created for each potential purchaser of the application information. The pseudo e-mail addresses or phone numbers and at least some of the application information are then provided to potential purchasers of the application information. Any communications sent using the pseudo e-mail addresses or phone numbers are initially directed to a mail server or phone system operated by or under the control of the entity that placed the advertisement. If a potential purchaser attempts to contact an applicant with the pseudo e-mail address or phone number without first paying for the application information, the e-mail or phone call is sent to the entity which generated the lead, not the applicant. Once a potential purchaser purchases the application information, communications made by the potential purchaser using the pseudo e-mail address are forwarded to the applicant's actual e-mail address.
    • 防止未经授权使用销售线索的系统和方法。 申请人在申请人查看互联网广告或其他广告后,从申请人那里收集申请信息。 申请信息可以包括申请人的电子邮件地址和电话号码。 然后创建至少一个伪电子邮件地址或电话号码,其识别至少一些应用信息和应用信息的潜在购买者。 为应用程序信息的每个潜在购买者创建一个独特的伪电子邮件地址或电话号码。 然后将伪电子邮件地址或电话号码以及至少一些应用信息提供给应用信息的潜在购买者。 使用伪电子邮件地址或电话号码发送的任何通信最初被定向到由放置广告的实体操作或由控制的实体的邮件服务器或电话系统。 如果潜在购买者试图通过伪电子邮件地址或电话号码与申请人联系,而无需首先支付申请信息,则电子邮件或电话将发送给产生潜在客户的实体,而不是申请人。 一旦潜在购买者购买了应用程序信息,潜在购买者使用伪电子邮件地址进行的通信将转发给申请人的实际电子邮件地址。