会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 12. 发明申请
    • Apparatus and method for testing audio jacks of sound card
    • 用于测试声卡插孔的装置和方法
    • US20090086985A1
    • 2009-04-02
    • US11905335
    • 2007-09-28
    • Ding-Hao ZhangDing-Zhuo WangZhong ShiTom ChenWin-Harn Liu
    • Ding-Hao ZhangDing-Zhuo WangZhong ShiTom ChenWin-Harn Liu
    • H04R29/00
    • H04R29/001H04R29/008
    • An apparatus and a method for testing audio jacks of a sound card are applicable for detecting whether at least one audio jack of the sound card in a personal computer (PC) sounds normally. Each audio jack provides at least one sound channel for transmitting a sound signal. The testing system includes driving circuits and a plurality of light-emitting units. The driving circuits are electrically connected to the sound card and an external voltage source, and used to change a current transmitting path according to the received sound signal. The light-emitting units are electrically connected to the driving circuits, and receive the current generated from the driving circuit, such that the light-emitting units emit lights. A sound channel to be tested is selected first, and a sound signal is sent to the sound channel. After the testing apparatus receives the sound signal, the light-emitting units emit lights.
    • 用于测试声卡的音频插孔的装置和方法适用于检测个人计算机(PC)中的声卡的至少一个音频插孔是否正常发声。 每个音频插孔提供至少一个用于传输声音信号的声音通道。 测试系统包括驱动电路和多个发光单元。 驱动电路电连接到声卡和外部电压源,并用于根据接收到的声音信号改变当前的发送路径。 发光单元电连接到驱动电路,并且接收从驱动电路产生的电流,使得发光单元发光。 首先选择要测试的声道,并将声音信号发送到声道。 在测试装置接收到声音信号之后,发光单元发光。
    • 13. 发明申请
    • SYSTEM OF CREATING LOGICAL VOLUME AND METHOD THEREOF
    • 创造逻辑体系的系统及其方法
    • US20090083503A1
    • 2009-03-26
    • US11858319
    • 2007-09-20
    • Lei LILei HeTom ChenWin-Harn Liu
    • Lei LILei HeTom ChenWin-Harn Liu
    • G06F12/16
    • G06F11/1458G06F2201/84
    • A system of creating logical volume and method thereof is used to solve the problems such as creation steps are complicated, a space of storage medium is wasted and the number of snapshots to be created is limited. An available logical volume space and a timestamp storage area are allocated in the logical volume according to space allocation algorithm. According to original data and data amended at subsequent time point in the logical volume, copy-on-write operation is sequentially performed on the amended data in the logical volume to create a timestamp corresponding to the time point. The timestamp of the corresponding time point is stored in the timestamp storage area. A storage medium offset address pointer is created to record writing position of the copy-on-write operation of the corresponding time point. And the pointer is stored in the storage medium to serve as index information of address of each timestamp.
    • 使用创建逻辑卷及其方法的系统来解决诸如创建步骤复杂,存储介质的空间被浪费并且要创建的快照的数量受限的问题。 根据空间分配算法,在逻辑卷中分配可用的逻辑卷空间和时间戳存储区域。 根据在逻辑卷的后续时间点修改的原始数据和数据,对逻辑卷中的修改数据顺序执行写时操作,以创建对应于时间点的时间戳。 相应时间点的时间戳存储在时间戳存储区域中。 创建存储介质偏移地址指针以记录对应时间点的写时复制操作的写入位置。 并且指针被存储在存储介质中以用作每个时间戳的地址的索引信息。
    • 14. 发明申请
    • Alarm method for insufficient storage space of network storage system
    • 网络存储系统存储空间不足的报警方式
    • US20080209032A1
    • 2008-08-28
    • US11709259
    • 2007-02-22
    • Jian-Feng GuoLei LiTom ChenWin-Harn Liu
    • Jian-Feng GuoLei LiTom ChenWin-Harn Liu
    • G06F15/173
    • H04L67/1097H04L29/06H04L41/0681H04L43/00H04L43/0817H04L43/16
    • An alarm method for insufficient storage space of a network storage system is provided. The method includes the following steps. Preset a time alarm threshold value according to a current operation state of the system when allocating storage spaces to users. Estimate a time that written data fully occupy a current remaining space according to a data writing speed to the storage space, a current idle memory of the system, total dirty data in a cache of the system, and the current remaining space in the storage space. Compare the estimated time value and the time alarm threshold value. And, send alarm information when the estimated time value is smaller than the time alarm threshold value. By setting the alarm threshold value of a time concept, a timely alarm of insufficient storage space is realized, which enhances the effective management of the storage space.
    • 提供一种网络存储系统的存储空间不足的报警方法。 该方法包括以下步骤。 在向用户分配存储空间时,根据系统的当前操作状态预设时间告警阈值。 根据对存储空间的数据写入速度,系统的当前空闲存储器,系统的高速缓存中的全部脏数据以及存储空间中的当前剩余空间,估计写入的数据完全占据当前剩余空间的时间 。 比较估计时间值和时间报警阈值。 并且,当估计时间值小于时间警报阈值时发送报警信息。 通过设置时间概念的告警阈值,实现对存储空间不足的及时报警,增强了存储空间的有效管理。
    • 15. 发明申请
    • Test system using local loop to establish connection to baseboard management control and method therefor
    • 测试系统使用本地环路建立与基板管理控制的连接及其方法
    • US20080205286A1
    • 2008-08-28
    • US11710495
    • 2007-02-26
    • Gui-He LiTom ChenWin-Harn Liu
    • Gui-He LiTom ChenWin-Harn Liu
    • H04L1/14
    • H04L1/243
    • A test system using a local loop to establish connection to baseboard management control is provided. The test system includes more than one host terminals having at least one network interface card (NIC) and at least one baseboard management controller (BMC) having one NIC. After establishing a connection for test between the host terminals and a remote subscriber, a connection for loop test is established with the BMC through a virtual address, so as to deliver a test instruction to the BMC for testing and to loop back a test result. The test system establishes the connection for loop test through the virtual address so as to perform a remote platform test similar to an inner loop test. Therefore, the test result will not be influenced by a network environment setting, and thus a batch test can be adopted to save the test time.
    • 提供了使用本地环路建立与基板管理控制连接的测试系统。 测试系统包括具有至少一个网络接口卡(NIC)的多个主机终端和具有一个NIC的至少一个基板管理控制器(BMC)。 在主机终端和远程用户建立测试连接后,通过虚拟地址与BMC建立环路测试连接,以便向BMC发送测试指令以进行测试并循环测试结果。 测试系统通过虚拟地址建立循环测试的连接,以便执行类似于内环测试的远程平台测试。 因此,测试结果不会受到网络环境设置的影响,因此可以采用批量测试来节省测试时间。
    • 17. 发明申请
    • Real-time heartbeat frequency regulation system and method utilizing user-requested frequency
    • 实时心跳频率调节系统和利用用户请求频率的方法
    • US20070250619A1
    • 2007-10-25
    • US11408953
    • 2006-04-24
    • Sheng LiTom ChenWin-Harn Liu
    • Sheng LiTom ChenWin-Harn Liu
    • G06F15/173G06F15/16
    • G06F19/3418G06F19/00G06F19/3481H04L43/10H04L43/103H04L67/1095H04L67/34
    • A system and method for regulating real-time the heartbeat frequency of the host according to the user-requested frequency, wherein the heartbeat frequency of the host is regulated through the service request signal sent from the user's end to the host by making use of a cluster system comprising a host and a backup host. Firstly, a frequency correspondence table is established. The host and the backup host transmit signals to each other at a predetermined frequency, which is set to the most recent heartbeat frequency of the host. Then the transmitting times of a plurality of service request signals are recorded to calculate the frequency of the most recent service request signal. Finally, the most recent heartbeat frequency of the host and the frequency of the most recent service request signal are compared to determine if the heartbeat frequency of the host needs to be regulated.
    • 一种用于根据用户请求的频率实时地调整主机的心跳频率的系统和方法,其中主机的心跳频率通过使用从用户端向主机发送的服务请求信号进行调节 集群系统包括主机和备份主机。 首先,建立频率对应表。 主机和备用主机以预定频率彼此发送信号,该预定频率被设置为主机的最近的心跳频率。 然后记录多个业务请求信号的发送时间,以计算最近业务请求信号的频率。 最后,比较主机的最近的心跳频率和最近的服务请求信号的频率,以确定主机的心跳频率是否需要调节。
    • 19. 发明申请
    • Internal tracing method for network attack detection
    • 网络攻击检测的内部跟踪方法
    • US20100031093A1
    • 2010-02-04
    • US12010698
    • 2008-01-29
    • Meng SunTom ChenWin-Harn Liu
    • Meng SunTom ChenWin-Harn Liu
    • G06F11/34G06F9/45G06F11/00
    • H04L63/102G06F21/552H04L2463/102
    • An internal tracing method for network attack detection is used to trace whole life cycle of an attack data packet for test in different phases such as an attacking phase, a defending phase, and an attacked phase through configuring and uniting three parties including an attack end point (AEP), a detect end point (DEP), and a target end point (TEP) and setting a corresponding internal check point in each part when testing a network intrusion detection system (IDS). In other words, when testing the network IDS, in a whole period that the attack data packet for test is attacking, filtered, detected, and finally transmitted to a target host, a tester may clearly know the statuses and information of the data packet in each important phase, thereby generating a test report conveniently, quickly, and accurately.
    • 网络攻击检测的内部跟踪方法用于通过配置和组合三方(包括攻击端点)来跟踪攻击数据包的整个生命周期,以检测不同阶段的攻击相位,防御阶段和攻击阶段 (AEP),检测终端(DEP)和目标终点(TEP),并在测试网络入侵检测系统(IDS)时在每个部分设置相应的内部检查点。 换句话说,当测试网络IDS时,测试的攻击数据包在一整个时间内进行攻击,过滤,检测并最终传输到目标主机,测试人员可以清楚地知道数据包的状态和信息 每个重要阶段,从而方便,快速,准确地生成测试报告。