会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Resource freshness and replication
    • 资源清新和复制
    • US07788223B2
    • 2010-08-31
    • US11364234
    • 2006-02-28
    • Huisheng LiuGuhan SuriyanarayananNikolaj S. Bjørner
    • Huisheng LiuGuhan SuriyanarayananNikolaj S. Bjørner
    • G06F7/00G06F17/00G06F15/16
    • G06F17/30578
    • Aspects of the subject matter described herein relate to resource replication systems. In aspects, a mechanism is described that detects when local resources are stale. Local resources may be stale when the time between a last successful synchronization activity and a current time exceeds a staleness value. If the local resources are determined to be stale, the local member may refrain from certain synchronization activities until the local member is allowed to resume these certain synchronization activities. If the local resources are not stale, additional synchronization activities including synchronizing resources between the member and an upstream or downstream partner may be performed.
    • 本文描述的主题的方面涉及资源复制系统。 在一些方面,描述了一种机制来检测当地资源何时陈旧。 当最后一次成功的同步活动与当前时间之间的时间超过了平淡度值时,本地资源可能会过时。 如果当地资源被确定为陈旧,当地成员可以避免某些同步活动,直到允许当地成员恢复这些某些同步活动。 如果本地资源不是过时的,则可以执行包括在成员和上游或下游伙伴之间同步资源的附加同步活动。
    • 13. 发明授权
    • Moving data from file on storage volume to alternate location to free space
    • 将数据从存储卷上的文件移动到备用位置到可用空间
    • US07506003B2
    • 2009-03-17
    • US11181063
    • 2005-07-14
    • Christophe Franck RobertAhmed H. MohamedGuhan SuriyanarayananSarosh Cyrus Havewala
    • Christophe Franck RobertAhmed H. MohamedGuhan SuriyanarayananSarosh Cyrus Havewala
    • G06F17/30
    • G06F17/30147Y10S707/99953
    • To reconstitute a ghosted file for use, a single ghosting filter on a computing device locates ghosting information in the metadata of the ghosted file and locates within the ghosting information an identification of a particular ghosting manager of the computing device, where the identified ghosting manager is responsible for the ghosted file. Thereafter, the ghosting filter communicates to the identified ghosting manager a request to obtain data of the ghosted file from a corresponding alternate location, and the identified ghosting manager does in fact obtain such requested data from such alternate location. Upon receiving the requested data of the ghosted file from the identified ghosting manager, then, the ghosting filter reconstitutes the received data to the ghosted file. The single ghosting filter is generic to all of the ghosting managers of the computing device.
    • 为了重构使用的幻影文件,计算设备上的单个重影过滤器将重影信息定位在重影文件的元数据中,并且在重影信息中定位计算设备的特定重影管理器的标识,其中识别的重影管理器是 负责ghosted文件。 此后,重影过滤器与所识别的重影管理器通信从相应的替代位置获取重影文件的数据的请求,并且所识别的重影管理器实际上从这样的替代位置获得这样的请求的数据。 然后,从所识别的重影管理器接收到所请求的重影文件的数据后,重像过滤器将收到的数据重新构建到重影文件。 单个重影过滤器与计算设备的所有重影管理器通用。
    • 16. 发明申请
    • Distributed malicious software protection in file sharing environments
    • 在文件共享环境中分布式恶意软件保护
    • US20080148403A1
    • 2008-06-19
    • US11638034
    • 2006-12-13
    • Todd ManionRyan KimSandeep K. SinghalGuhan Suriyanarayanan
    • Todd ManionRyan KimSandeep K. SinghalGuhan Suriyanarayanan
    • G06F12/14
    • G06F21/56
    • Automatic file replication and scanning for malware in a sharing environment is based on detection of file system changes. Only one client of the multi-client environment needs to include malware protection software for all clients to benefit. A file replication service for each client monitors a shared directory, and synchronizes files across clients at the file system driver level. When a new file appears in the shared directory of a client system, through this driver, the new file automatically gets replicated. A malware protection component operates by monitoring the directory for new or modified files. File replication causes automatic malware scanning on the client that has protection. When the file has been cleaned and re-written to the directory, the replication service senses that the file has changed and replicates the cleaned file to the other clients. Thus, the replication behavior produces a multiparty file scanning and cleansing protection scheme.
    • 在共享环境中自动文件复制和扫描恶意软件是基于文件系统更改的检测。 多客户端环境中只有一个客户端需要包含所有客户端的恶意软件保护软件才能受益。 每个客户机的文件复制服务器监视共享目录,并在文件系统驱动程序级别跨客户机同步文件。 当一个新文件出现在客户端系统的共享目录中时,通过该驱动程序,新文件将自动被复制。 恶意软件保护组件通过监视新的或修改的文件的目录来运行。 文件复制会在具有保护的客户端上自动进行恶意软件扫描。 当文件已被清理并重新写入目录时,复制服务会检测到文件已更改,并将清除的文件复制到其他客户端。 因此,复制行为产生多方文件扫描和清理保护方案。
    • 20. 发明申请
    • Moving data from file on storage volume to alternate location to free space
    • 将数据从存储卷上的文件移动到备用位置到可用空间
    • US20070016618A1
    • 2007-01-18
    • US11181063
    • 2005-07-14
    • Christophe RobertAhmed MohamedGuhan SuriyanarayananSarosh Havewala
    • Christophe RobertAhmed MohamedGuhan SuriyanarayananSarosh Havewala
    • G06F17/30
    • G06F17/30147Y10S707/99953
    • To reconstitute a ghosted file for use, a single ghosting filter on a computing device locates ghosting information in the metadata of the ghosted file and locates within the ghosting information an identification of a particular ghosting manager of the computing device, where the identified ghosting manager is responsible for the ghosted file. Thereafter, the ghosting filter communicates to the identified ghosting manager a request to obtain data of the ghosted file from a corresponding alternate location, and the identified ghosting manager does in fact obtain such requested data from such alternate location. Upon receiving the requested data of the ghosted file from the identified ghosting manager, then, the ghosting filter reconstitutes the received data to the ghosted file. The single ghosting filter is generic to all of the ghosting managers of the computing device.
    • 为了重构使用的幻影文件,计算设备上的单个重影过滤器将重影信息定位在重影文件的元数据中,并且在重影信息中定位计算设备的特定重影管理器的标识,其中识别的重影管理器是 负责ghosted文件。 此后,重影过滤器与所识别的重影管理器通信从相应的替代位置获取重影文件的数据的请求,并且所识别的重影管理器实际上从这样的替代位置获得这样的请求的数据。 然后,从所识别的重影管理器接收到所请求的重影文件的数据后,重像过滤器将收到的数据重新构建到重影文件。 单个重影过滤器与计算设备的所有重影管理器通用。