会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 25. 发明申请
    • Execution validation using header containing validation data
    • 使用包含验证数据的头执行验证
    • US20060185017A1
    • 2006-08-17
    • US11319329
    • 2005-12-28
    • David ChallenerDaryl CromerHoward LockerDavid SaffordRandall Springfield
    • David ChallenerDaryl CromerHoward LockerDavid SaffordRandall Springfield
    • G06F12/14
    • G06F21/565G06F2221/2151
    • The present invention adds a procedure to the operating system file subsystem of a processing system that significantly reduces the amount of time necessary to verify the validity of executable files. Each executable is extended with a file signature containing a header containing validation data. This header may be added to an existing ELF header, added as a new section, or placed in a file's extended attribute store. The header contains results of all previous validation checks that have been performed. The file signature is inserted, with a date stamp, into the file attributes. On execution, the system checks the previously-created file signature against a current file signature, instead of creating the file signature for every file during the execution process. Checks to ensure that the file signature is secure, and is valid and up to date, are also implemented. Only if the file signature is not valid and up-to-date does the execution program create a new file signature at the time of execution.
    • 本发明向处理系统的操作系统文件子系统添加了一个过程,其显着地减少了验证可执行文件的有效性所需的时间量。 每个可执行文件使用包含包含验证数据的标题的文件签名进行扩展。 该标题可以被添加到现有的ELF标题中,作为新的部分添加,或者被放置在文件的扩展属性存储中。 标题包含已执行的所有先前验证检查的结果。 将文件签名带有日期戳插入到文件属性中。 执行时,系统会根据当前文件签名检查先前创建的文件签名,而不是在执行过程中为每个文件创建文件签名。 检查以确保文件签名是安全的,并且是有效的和最新的,也被实现。 只有当文件签名无效且最新的执行程序在执行时才会创建新的文件签名。
    • 26. 发明申请
    • Desktop computer blade fault identification system and method
    • 台式电脑刀片故障识别系统及方法
    • US20060168486A1
    • 2006-07-27
    • US11044433
    • 2005-01-27
    • Daryl CromerHoward LockerRandall SpringfieldRod Waltermann
    • Daryl CromerHoward LockerRandall SpringfieldRod Waltermann
    • G06F11/00
    • H04L41/00G01R31/08
    • A method and system for remotely isolating faults in computer network devices coupled to a computer network. A plurality of first computer units are coupled to the computer network. The plurality of first computer units are located on a user side of the computer network. A plurality of second computer units are coupled to the computer network. The plurality of second computer units are located on a service provider side of the network. One of the plurality of second computer units is designated to provide computing services to one of the plurality of first computer units. One of the plurality of first computer units experiencing a fault communicating with its designated second computer unit uses another of the plurality of first computer units as a proxy computer unit to remotely isolate the fault.
    • 一种用于远程隔离耦合到计算机网络的计算机网络设备中的故障的方法和系统。 多个第一计算机单元耦合到计算机网络。 多个第一计算机单元位于计算机网络的用户侧。 多个第二计算机单元耦合到计算机网络。 多个第二计算机单元位于网络的服务提供方侧。 多个第二计算机单元中的一个被指定为向多个第一计算机单元之一提供计算服务。 经历与其指定的第二计算机单元通信的故障的多个第一计算机单元中的一个使用多个第一计算机单元中的另一个作为代理计算机单元远程隔离故障。
    • 27. 发明申请
    • Reducing the boot time of a client device in a client device/data center environment
    • 减少客户端设备/数据中心环境中客户端设备的启动时间
    • US20060161765A1
    • 2006-07-20
    • US11038630
    • 2005-01-19
    • Daryl CromerHoward LockerRandall SpringfieldRod Waltermann
    • Daryl CromerHoward LockerRandall SpringfieldRod Waltermann
    • G06F9/00
    • G06F9/4416
    • A method, computer program product and system for reducing the boot time of a client device in a client device/data center environment. A profile of the client device, which includes information regarding the usage characteristics of the client device, may be created. A confidence level indicating the likelihood that the client device is going to be booted may be determined based on the client device's profile. The confidence level and the utilization of the resources of the server blades in the data center may be examined in determining whether to have an appropriate server blade perform an action involved in booting the operating system of the client device. If the appropriate server blade performs such an action, e.g., pre-booting the client device's operating system, prior to the user of the client device attempting to boot its operating system, then the boot time may be reduced.
    • 一种用于减少客户端设备/数据中心环境中的客户端设备的启动时间的方法,计算机程序产品和系统。 可以创建包括关于客户端设备的使用特性的信息的客户端设备的配置文件。 指示客户端设备将被引导的可能性的置信水平可以基于客户端设备的配置文件来确定。 可以在确定是否使适当的服务器刀片执行引导客户端设备的操作系统所涉及的动作时检查数据中心中的信任级别和服务器刀片的资源的利用。 如果适当的服务器刀片在客户端设备的用户尝试引导其操作系统之前执行诸如预先引导客户端设备的操作系统的动作,则可以减少启动时间。
    • 28. 发明申请
    • ROM scan memory expander
    • ROM扫描存储器扩展器
    • US20060047858A1
    • 2006-03-02
    • US10929323
    • 2004-08-30
    • William AthertonDaryl CromerRichard DayanScott DunhamEric KernHoward LockerWilliam SchwartzAdam Soderlund
    • William AthertonDaryl CromerRichard DayanScott DunhamEric KernHoward LockerWilliam SchwartzAdam Soderlund
    • G06F3/00
    • G06F9/4411
    • A method and system for booting up multiple PCI peripheral devices, such that the number of bootable PCI peripheral devices is not limited by the amount of computer system memory that is dedicated to storing executable boot code for the peripheral devices. The executable boot code is stored on a Read Only Memory (ROM) on each peripheral device. When a new PCI peripheral device begins to boot up, a check for available memory space in a ROM scan memory address space is performed. If there is not enough available room in the ROM scan memory address space for the new device's executable boot code, then a ROM scan detection logic pages an image of another peripheral device's executable boot code out of the ROM scan memory address space before storing the new device's executable boot code into the ROM scan memory address space.
    • 一种用于引导多个PCI外围设备的方法和系统,使得可引导PCI外围设备的数量不受专用于存储外围设备的可执行引导代码的计算机系统存储器的数量的限制。 可执行启动代码存储在每个外围设备上的只读存储器(ROM)上。 当新的PCI外围设备开始启动时,执行ROM扫描存储器地址空间中可用存储器空间的检查。 如果新设备的可执行启动代码的ROM扫描存储器地址空间中没有足够的可用空间,则ROM扫描检测逻辑在存储新的设备的ROM扫描存储器地址空间之前将另一外围设备的可执行引导代码的映像从ROM扫描存储器地址空间中读出 设备的可执行引导代码进入ROM扫描存储器地址空间。
    • 29. 发明申请
    • Systems and methods for recovering passwords and password-protected data
    • 用于恢复密码和受密码保护的数据的系统和方法
    • US20060041932A1
    • 2006-02-23
    • US10924103
    • 2004-08-23
    • Daryl CromerRichard ChestonSteven GoodmanHoward LockerRandall Springfield
    • Daryl CromerRichard ChestonSteven GoodmanHoward LockerRandall Springfield
    • H04L9/32
    • H04L9/3226H04L9/0897
    • Systems and methods to access password-protected stored data when a corresponding data password has been lost, forgotten, or is otherwise unavailable, and to recover the data password to facilitate access to the password-protected data from a digital memory device such as a hard disk drive associated with a user computer. In some embodiments the computer is communicatively coupled with a network and receives at least one encryption key from a secure computer via the network. In other embodiments the computer is a stand alone computer and receives at least one encryption key from a removable, non-volatile memory such as a CD ROM. The encryption key is used to encrypt the data password and both are stored on the hard disk drive. If the data password becomes lost, forgotten, or otherwise unavailable, the encrypted password is recovered from the hard disk drive and decrypted to recover the data password.
    • 当相应的数据密码丢失,被遗忘或不可用时访问受密码保护的存储数据的系统和方法,以及恢复数据密码以便于从诸如硬的数字存储设备访问受密码保护的数据 与用户计算机相关联的磁盘驱动器。 在一些实施例中,计算机与网络通信耦合,并经由网络从安全计算机接收至少一个加密密钥。 在其他实施例中,计算机是独立的计算机,并且从诸如CD ROM的可移除的非易失性存储器接收至少一个加密密钥。 加密密钥用于加密数据密码,两者都存储在硬盘驱动器上。 如果数据密码丢失,忘记或以其他方式不可用,则会从硬盘驱动器恢复加密的密码并解密以恢复数据密码。
    • 30. 发明申请
    • Methods and arrangements for capturing runtime information
    • 捕获运行时信息的方法和安排
    • US20050283343A1
    • 2005-12-22
    • US10871848
    • 2004-06-18
    • Daryl CromerMark DavisHoward LockerRandall Springfield
    • Daryl CromerMark DavisHoward LockerRandall Springfield
    • G06F15/00H03F1/26H04B15/00
    • G06F11/348G06F11/0778G06F11/1666G06F11/2015
    • Methods and arrangements for capturing information related to operational conditions are disclosed. Embodiments include volatile memory to quickly record operational parameters via, e.g., basic input output system (BIOS) code, system management interrupt (SMI) code and/or executing applications. Many embodiments provide an alternative power source and a voltage switch to protect against loss of the information between storage in the volatile memory and storage in the non-volatile memory. Some embodiments include a read controller that provides access to the volatile memory when primary power is available. The read controller may also offer direct access to the non-volatile memory in case of a catastrophic failure that renders the processing device substantially non-functional. Further embodiments include a second processing device to generate a usage model and/or to perform diagnostics with the operational parameters.
    • 公开了捕获与操作条件有关的信息的方法和布置。 实施例包括通过例如基本输入输出系统(BIOS)代码,系统管理中断(SMI)代码和/或执行应用程序来快速记录操作参数的易失性存储器。 许多实施例提供了替代电源和电压开关,以防止在易失性存储器中的存储器和非易失性存储器中的存储之间的信息丢失。 一些实施例包括在主电源可用时提供对易失性存储器的访问的读取控制器。 在导致处理设备基本上不起作用的灾难性故障的情况下,读控制器还可以提供对非易失性存储器的直接访问。 另外的实施例包括用于生成使用模型和/或使用操作参数执行诊断的第二处理装置。