会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 31. 发明授权
    • Log management system and method
    • 日志管理系统和方法
    • US07707189B2
    • 2010-04-27
    • US10958848
    • 2004-10-05
    • J. Kirk HaseldenSergei Ivanov
    • J. Kirk HaseldenSergei Ivanov
    • G06F7/00
    • G06F11/3636G06F11/3476G06F2201/86H04L41/0604
    • A system and method for managing log entries associated with execution events in an application. The system and method may include a log provider wrapper for receiving log entries associated with the event and log providers for receiving all or part of the information associated with a log entry. The log provider wrapper, through communication with a logging configuration, may filter the log entry, segment information contained in the log entry, format the information, and deliver the information to one or more log providers. The log providers may send the information to a respective destination medium.
    • 用于管理与应用程序中的执行事件相关联的日志条目的系统和方法。 系统和方法可以包括用于接收与事件相关联的日志条目的日志提供程序包装器和用于接收与日志条目相关联的所有或部分信息的日志提供程序。 日志提供程序包装器通过与日志配置进行通信,可以过滤日志条目,日志条目中包含的段信息,格式化信息,并将信息传递给一个或多个日志提供程序。 日志提供者可以将信息发送到相应的目的地介质。
    • 35. 发明授权
    • Checkpoint restart system and method
    • 检查点重新启动系统和方法
    • US07634687B2
    • 2009-12-15
    • US11035257
    • 2005-01-13
    • James Kirk HaseldenSergei Ivanov
    • James Kirk HaseldenSergei Ivanov
    • G06F11/00
    • G06F11/0793G06F11/0706
    • The subject invention pertains to a systems and methods of restarting programs upon failure. In particular, the systems and methods provide for generation of a checkpoint component including program execution status or completion data as well as state. This checkpoint component can then be employed by an execution engine to restart the program at a point in time captured by the checkpoint component. According to one specific aspect of the invention, these systems and methods can be applied to a workflow system to facilitate restarting a workflow package or process described thereby.
    • 本发明涉及在故障时重新启动程序的系统和方法。 特别地,系统和方法提供生成包括程序执行状态或完成数据以及状态的检查点组件。 然后,该检查点组件可由执行引擎使用,以在由检查点组件捕获的时间点重启该程序。 根据本发明的一个具体方面,这些系统和方法可以应用于工作流系统以便于重新启动由此描述的工作流程包或处理过程。
    • 36. 发明授权
    • Object model document for obfuscating object model therein
    • 其中模糊对象模型的对象模型文档
    • US07591021B2
    • 2009-09-15
    • US10656384
    • 2003-09-05
    • J. Kirk HaseldenSergei Ivanov
    • J. Kirk HaseldenSergei Ivanov
    • G06F17/30
    • G06F21/629G06F21/6218
    • A persisted object model is loaded from an object model document comprising a compiled executable file having an image source, a security source, and a loader. The loader is instantiated, and instantiates the object model from the image source and a security agent from the security source to control access to the instantiated object model. The loader returns to a commander a first reference to the instantiated security agent, whereby the commander in employing the first reference accesses the security agent rather than the instantiated object model. A commander issues a command to the instantiated object model by way of the first reference to the security agent, and the security agent receives and reviews same according to pre-defined rules to determine whether the object model should in fact receive the command. If so, the security agent forwards the command to the object model.
    • 从包含具有图像源,安全源和加载器的编译的可执行文件的对象模型文档加载持久对象模型。 加载程序被实例化,并从图像源实例化对象模型,并从安全源实例化安全代理,以控制对实例化对象模型的访问。 加载程序向命令器返回对实例化安全代理的第一个引用,从而采用第一个引用的指令器访问安全代理而不是实例化的对象模型。 指挥官通过对安全代理的第一次引用向实例化对象模型发出命令,并且安全代理根据预定义的规则接收并审查相同的命令,以确定对象模型实际上是否应该接收命令。 如果是这样,安全代理将命令转发到对象模型。
    • 37. 发明授权
    • Automatic detection and patching of vulnerable files
    • 自动检测和修补易受攻击的文件
    • US07424706B2
    • 2008-09-09
    • US10621148
    • 2003-07-16
    • Oleg IvanovSergei Ivanov
    • Oleg IvanovSergei Ivanov
    • G06F9/44G06F7/04G08B23/00
    • G06F21/57G06F8/65
    • Systems and methods are described that enable patching of security vulnerabilities in binary files. The detection and patching of vulnerable binary files is automatic, reliable, regression free, and comprehensive across networks on an unlimited scale. These advantages can be realized in various ways including, for example, by leveraging current anti-virus infrastructure that is widely deployed across the Internet. Reliable discovery of vulnerable binary files (e.g., in operating systems, application programs, etc.) is achieved through the use of binary signatures that have been associated with discovered security vulnerabilities. A divergence of security patches away from conventional service packs provides for the possibility of production of regression-free fixes for security vulnerabilities in binary files.
    • 描述了能够修复二进制文件中的安全漏洞的系统和方法。 易受攻击的二进制文件的检测和修补是自动的,可靠的,无回归的,并且跨网络的无缝扩展。 这些优点可以以各种方式实现,包括例如通过利用在互联网上广泛部署的当前反病毒基础设施。 通过使用与发现的安全漏洞相关联的二进制签名来实现易受攻击的二进制文件(例如,在操作系统,应用程序等中)的可靠发现。 远离常规服务包的安全补丁分散提供了为二进制文件中的安全漏洞生成无回归修复的可能性。