会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 43. 发明授权
    • Enforcement of service terms through adaptive edge processing of application data
    • 通过应用程序数据的自适应边缘处理来强制执行服务条款
    • US07266542B2
    • 2007-09-04
    • US10121376
    • 2002-04-12
    • Ronald P. DoyleYongcheng LiDinesh Chandra Verma
    • Ronald P. DoyleYongcheng LiDinesh Chandra Verma
    • G06F17/30
    • G06F17/30902Y10S707/99932
    • An adaptive data replication and caching system configured to enforce service terms at the network edge. Service terms can include, but are not limited to established quality of service (QoS) terms, as well as the terms of a service level agreement (SLA). This system can include a data caching system configured to cache application data in a data store and to satisfy queries for application data from the cache. The system also can include a data replication system configured to replicate application data in the data store and to satisfy queries for application data against the replicated application data. Finally, the adaptive data replication and caching system can include a configurator for configuring portions of the data store for exclusive use by the data caching system and the data replication system based upon the service terms.
    • 配置为在网络边缘执行服务条款的自适应数据复制和缓存系统。 服务条款可以包括但不限于已建立的服务质量(QoS)术语,以及服务级别协议(SLA)的条款。 该系统可以包括配置为缓存数据存储器中的应用数据并满足来自高速缓存的应用数据的查询的数据缓存系统。 该系统还可以包括配置为在数据存储中复制应用数据并满足针对复制的应用数据的应用数据的查询的数据复制系统。 最后,自适应数据复制和缓存系统可以包括配置器,用于根据服务条款来配置数据存储系统和数据复制系统专用的数据存储部分。
    • 45. 发明授权
    • Addressing the name space mismatch between content servers and content caching systems
    • 解决内容服务器和内容缓存系统之间的名称空间不匹配
    • US06985936B2
    • 2006-01-10
    • US09966229
    • 2001-09-27
    • Rajesh S. AgarwallaRonald P. DoyleTianyu JiangThirumale NiranjanSrikanth Ramamurthy
    • Rajesh S. AgarwallaRonald P. DoyleTianyu JiangThirumale NiranjanSrikanth Ramamurthy
    • G06F15/177G06F12/00G06F7/00
    • H04L67/2804G06F17/30902H04L67/02H04L67/2819H04L67/2852H04L69/329
    • Techniques are disclosed for addressing the name space mismatch between content caching systems (which use Uniform Resource Locators, or “URLs”) and content servers (which use file and path names). A file name-to-URL mapping is created for use by content caching systems, and data in protocol response messages (and optionally in protocol request messages) is augmented to transmit information for use in creating this mapping, enabling a content caching system to automatically and dynamically populate its file name-to-URL mapping. By having the file name available, the caching system can now respond to content management messages which identify the cached content by only the content's associated file name. Techniques for encoding the message extensions include: use of new directives on existing cache-control headers in Hypertext Transfer Protocol (“HTTP”) messages; addition of new headers in HTTP messages; and use of meta-data in markup languages such as Hypertext Markup Language (“HTML”) or Extensible Markup Language (“XML”) format.
    • 公开了解决内容缓存系统(使用统一资源定位符或“URL”)与内容服务器(使用文件和路径名称)之间的名称空间不匹配的技术。 创建文件名到URL映射以供内容缓存系统使用,并且扩展协议响应消息中的数据(以及可选地在协议请求消息中)以传输用于创建该映射的信息,从而使内容缓存系统自动地 并动态填充其文件名称到URL的映射。 通过使文件名可用,缓存系统现在可以仅通过内容的关联文件名来响应标识缓存内容的内容管理消息。 用于编码消息扩展的技术包括:在超文本传输​​协议(“HTTP”)消息中对现有高速缓存控制报头使用新的指令; 在HTTP消息中添加新标头; 以及使用诸如超文本标记语言(“HTML”)或可扩展标记语言(“XML”)格式的标记语言中的元数据。
    • 46. 发明授权
    • Hierarchical load balancing
    • 分层负载均衡
    • US08171139B2
    • 2012-05-01
    • US13188163
    • 2011-07-21
    • Jeffrey Scott ChaseRonald P. Doyle
    • Jeffrey Scott ChaseRonald P. Doyle
    • G06F15/173G06F9/26
    • H04L29/06H04L67/1002H04L67/1014H04L67/1023H04L69/329H04L2029/06054
    • Popular object requests are handled using a front-end cache, and hashing is applied only to the requests in the stream that were not handled by the front-end cache. A cache (e.g., a web proxy cache) is placed in front of a Level 7 switch and services the popular requests from the cache based on the content of the request (e.g., based on the portion of an HTTP request following the domain name). The remaining requests are hashed and then routed to the back-end server. Requests that make it past the cache are still routed to the back-end server. A Level 4 switch is placed in front of a plurality of web proxy caches, each of which are in turn placed in front of a respective Level 7 switch, each of which are connected to a respective server farm, so that incoming web requests are handled on a round robin basis (or other SLB technique) before being sent to the cache.
    • 流行的对象请求使用前端缓存进行处理,并且散列仅应用于流未被前端缓存处理的请求。 缓存(例如,Web代理缓存)放置在7级交换机的前面,并根据请求的内容(例如,基于域名后面的HTTP请求的部分)为缓存提供的流行请求提供服务, 。 剩余的请求被散列,然后路由到后端服务器。 使其超越缓存的请求仍然路由到后端服务器。 4级交换机被放置在多个web代理缓存前面,每个代理缓存又被放置在相应的Level 7交换机的前面,每个级别7交换机连接到相应的服务器场,从而处理传入的web请求 在循环(或其他SLB技术)发送到缓存之前。
    • 49. 发明申请
    • DEVICE CERTIFICATE BASED APPLIANCE CONFIGURATION
    • 基于设备认证的器具配置
    • US20090060187A1
    • 2009-03-05
    • US11848557
    • 2007-08-31
    • Ronald P. DoyleJohn R. HindMarcia L. Stockton
    • Ronald P. DoyleJohn R. HindMarcia L. Stockton
    • H04L9/32H04K1/00
    • H04L63/0823H04L9/3247H04L9/3268H04L63/0435
    • Embodiments of the present invention address deficiencies of the art in respect to configuring a computing appliance and provide a method, system and computer program product for device certificate based virtual appliance configuration. In one embodiment of the invention, a virtual appliance secure configuration method can be provided. The method can include mounting non-volatile storage to the virtual appliance, retrieving a device certificate from the mounted storage and extracting a signature from the device certificate, activating the virtual appliance in a network domain and acquiring an adapter address and unique identifier for the virtual appliance, and authenticating the signature with the adapter address and unique identifier to ensure a unique active instance of the virtual appliance.
    • 本发明的实施例解决了关于配置计算设备的本领域的缺陷,并提供了基于设备证书的虚拟设备配置的方法,系统和计算机程序产品。 在本发明的一个实施例中,可以提供虚拟设备安全配置方法。 该方法可以包括将非易失性存储器安装到虚拟设备,从安装的存储器检索设备证书并从设备证书中提取签名,激活网络域中的虚拟设备并且获取适配器地址和虚拟的唯一标识符 设备,并使用适配器地址和唯一标识符身份验证签名,以确保虚拟设备的唯一活动实例。