会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 62. 发明申请
    • USING A MEMORY ADDRESS TRANSLATION STRUCTURE TO MANAGE PROTECTED MICRO-CONTEXTS
    • 使用存储器地址转换结构来管理保护的MICR-CONTEXTS
    • US20090172341A1
    • 2009-07-02
    • US11967458
    • 2007-12-31
    • David M. DurhamUday R. SavagaonkarRavi Sahita
    • David M. DurhamUday R. SavagaonkarRavi Sahita
    • G06F12/10
    • G06F12/1009G06F9/461G06F12/1036G06F12/109G06F12/145G06F2212/651
    • Embodiments of an invention for using a memory address translation structure to manage protected micro-contexts are disclosed. In one embodiment, an apparatus includes an interface and memory management logic. The interface is to perform a transaction to fetch information from a memory. The memory management logic is to translate an untranslated address to a memory address. The memory management logic includes a storage location, a series of translation stages, and determination logic. The storage location is to store an address of a data structure for the first translation stage. Each of the translation stages includes translation logic to find an entry in a data structure based on a portion of the untranslated address. Each entry is to store an address of a different data structure for the first translation stage, an address of a data structure for a successive translation stage, or the physical address. The determination logic is to determine whether an entry is storing an address of a different data structure for the first translation stage.
    • 公开了使用存储器地址转换结构来管理受保护的微上下文的发明的实施例。 在一个实施例中,一种装置包括接口和存储器管理逻辑。 该接口是执行一个事务来从内存中获取信息。 存储器管理逻辑将非翻译地址转换为存储器地址。 存储器管理逻辑包括存储位置,一系列转换级和确定逻辑。 存储位置是存储用于第一翻译阶段的数据结构的地址。 每个翻译阶段包括翻译逻辑,以基于未翻译地址的一部分在数据结构中找到条目。 每个条目是存储用于第一翻译阶段的不同数据结构的地址,用于连续翻译阶段的数据结构的地址或物理地址。 确定逻辑是确定条目是否存储用于第一翻译阶段的不同数据结构的地址。
    • 64. 发明授权
    • Up-tree topology trace for network route tracing
    • 用于网络路由跟踪的up-tree拓扑跟踪
    • US07463638B2
    • 2008-12-09
    • US10795791
    • 2004-03-08
    • David M. DurhamRussell J. Fenger
    • David M. DurhamRussell J. Fenger
    • H04L12/28G06F15/16
    • H04L45/02H04L45/48
    • A network route tracing system traces a path through a network and identifiesnetwork components and communications links affected by the path. According to one embodiment of the present invention, a route is traced between two hosts in a network. The network is represented as a logical tree having a plurality of nodes. Each one of the nodes corresponds to a component in the network and each non-root node has a parent node. Two nodes are identified in the logical tree. A first node corresponds to a first host and a second node corresponding to a second host. If one of the two nodes exists at a lower level of the logical tree, then a first path is traced from the first node at the lower level to the parent node at a higher level until the parent node is at a same level of the logical tree as the second node. The first path is further traced up the logical tree from the parent node and a second path is traced up the logical tree from the second node until the first path and the second path meet at a same node.
    • 网络路由跟踪系统通过网络跟踪路径,并识别受路径影响的网络组件和通信链路。 根据本发明的一个实施例,在网络中的两个主机之间追踪路由。 网络被表示为具有多个节点的逻辑树。 每个节点对应于网络中的一个组件,每个非根节点都有一个父节点。 在逻辑树中标识两个节点。 第一节点对应于第一主机和对应于第二主机的第二节点。 如果两个节点中的一个存在于逻辑树的较低层,则将第一路径从较低级别的第一节点追溯到较高级别的父节点,直到父节点处于逻辑层的相同级别 树作为第二个节点。 第一条路径从父节点进一步跟踪逻辑树,第二条路径从第二个节点追溯到逻辑树,直到第一条路径和第二条路径在同一个节点相交。
    • 67. 发明授权
    • Prevention of denial of service attacks
    • 防止拒绝服务攻击
    • US07254133B2
    • 2007-08-07
    • US10196541
    • 2002-07-15
    • Priya GovindarajanDavid M. Durham
    • Priya GovindarajanDavid M. Durham
    • H04L12/28
    • H04L63/1458H04L29/06H04L69/16H04L69/163
    • Denial of service type attacks are attacks where the nature of a system used to establish communication sessions is exploited to prevent the establishment of sessions. For example, to establish a Transmission Control Protocol (TCP)/Internet Protocol (IP) communication session, a three-way handshake is performed between communication endpoints. When a connection request is received, resources are allocated towards establishing the communication session. Malicious entities can attack the handshake by repeatedly only partially completing the handshake, causing the receiving endpoint to run out of resources for allocating towards establishing sessions, thus preventing legitimate connections. Illustrated embodiments overcome such attacks by delaying allocating resources until after the three-way handshake is successfully completed.
    • 拒绝服务类型攻击是攻击,其中用于建立通信会话的系统的性质被利用来阻止建立会话。 例如,为了建立传输控制协议(TCP)/因特网协议(IP)通信会话,在通信端点之间执行三次握手。 当接收到连接请求时,分配资源来建立通信会话。 恶意实体可以通过重复仅部分完成握手来攻击握手,导致接收端点用尽资源以分配建立会话,从而防止合法连接。 示例性实施例通过延迟分配资源来克服这种攻击,直到三次握手成功完成。
    • 68. 发明授权
    • Method and apparatus for high accuracy distributed time synchronization using processor tick counters
    • 使用处理器刻度计数器的高精度分布式时间同步的方法和装置
    • US07194556B2
    • 2007-03-20
    • US09823070
    • 2001-03-30
    • Priya RajagopalDavid M. Durham
    • Priya RajagopalDavid M. Durham
    • G06F15/16
    • G06F1/12
    • A method and apparatus are provided that allow processing engines to be synchronized to each other with high accuracy. In one embodiment, the invention includes obtaining a processor tick counter value from a first processing engine, comparing the obtained processor tick counter value to a processor tick counter value from a second processing engine and determining a timing offset for synchronizing the first processing engine and the second processing engine using the comparison. The invention may further include obtaining a processor tick counter value by sending a request message from the second processing engine to the first processing engine, and receiving a reply from the first processing engine at the second processing engine. The processor tick counter value at the second processing engine can be determined by recording the time at which the request message is sent and by recording the time at which the reply is received. The invention can further include obtaining a processor frequency from the first processing engine, obtaining a processor frequency from the second processing engine and correcting the timing offset for any difference between the first processing engine frequency and the second processing engine frequency.
    • 提供了一种方法和装置,其允许处理引擎以高精度彼此同步。 在一个实施例中,本发明包括从第一处理引擎获得处理器刻度计数器值,将得到的处理器刻度计数值与来自第二处理引擎的处理器刻度计数器值进行比较,并确定用于使第一处理引擎和 第二处理引擎使用比较。 本发明还可以包括通过从第二处理引擎向第一处理引擎发送请求消息并且在第二处理引擎处接收来自第一处理引擎的回复来获得处理器计数值。 可以通过记录发送请求消息的时间并记录回复的时间来确定第二处理引擎处理器计数器值。 本发明还可以包括从第一处理引擎获得处理器频率,从第二处理引擎获得处理器频率,并且校正第一处理引擎频率和第二处理引擎频率之间的差异的定时偏移。