会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 87. 发明授权
    • Systems and methods for contextual evaluation of files for use in file restoration
    • 用于文件恢复的文件的上下文评估的系统和方法
    • US08352438B1
    • 2013-01-08
    • US12882497
    • 2010-09-15
    • Mark Kennedy
    • Mark Kennedy
    • G06F7/00G06F17/00
    • G06F21/568
    • A method for contextual evaluation of files for use in file restoration. The method may include receiving a request to replace a damaged file on a computing system with a clean instance of the damaged file and identifying a clean file that corresponds to the damaged file. The method may also include identifying at least one file set that includes the clean file. The method may further include evaluating the suitability of the clean file for use as a replacement for the damaged file by: 1) determining whether the computing system includes an instance of each file in the file set and 2) deciding, based on the determination of whether the computing system includes an instance of each file in the file set, whether to replace the damaged file with the clean file. Various other methods, systems, and computer-readable media are also disclosed.
    • 用于文件恢复的文件的上下文评估方法。 该方法可以包括使用损坏文件的干净实例来接收用计算系统替换损坏文件的请求,并且识别与损坏文件相对应的干净文件。 该方法还可以包括识别包括干净文件的至少一个文件集。 该方法可以进一步包括:通过以下操作来评估干净文件用于替换损坏文件的适用性:1)确定计算系统是否包括文件集中的每个文件的实例,以及2)基于 计算系统是否包括文件集中的每个文件的实例,是否用干净的文件替换损坏的文件。 还公开了各种其它方法,系统和计算机可读介质。
    • 88. 发明授权
    • System and method for orchestrating services
    • 用于协调业务的系统和方法
    • US08347388B1
    • 2013-01-01
    • US12242866
    • 2008-09-30
    • Michael John DutchChristopher Hercules ClaudatosWilliam Dale AndrussBruce David Leetch
    • Michael John DutchChristopher Hercules ClaudatosWilliam Dale AndrussBruce David Leetch
    • G06F17/00
    • G06F21/568G06F11/1453
    • Data from application systems is copied to a server. The server generates different views of some or all of the data and provides the views to services that may be running on other systems. Each view may be of a subset of the data on the server, and the subsets may be mutually exclusive. Each view is in a format appropriate to the service consuming it, and the format may be block level, file level, stream, or other format appropriate to the service. The data may be deduplicated, and the deduplicated data processed by a service. The result of the processing of an object containing a deduplicated portion of data may be applied to other objects sharing the deduplicated portion of data. A workflow may be applied to the objects sharing the deduplicated portion of data.
    • 来自应用系统的数据被复制到服务器。 服务器生成一些或全部数据的不同视图,并将视图提供给可能在其他系统上运行的服务。 每个视图可以是服务器上的数据的子集,并且子集可以是互斥的。 每个视图的格式都适合于使用它的服务,并且格式可以是块级别,文件级别,流或适用于该服务的其他格式。 数据可以被重复数据删除,并且由服务处理的重复数据删除的数据。 包含重复数据删除部分数据的对象的处理结果可以应用于共享重复数据删除部分数据的其他对象。 可以将工作流应用于共享重复数据删除的数据部分的对象。
    • 90. 再颁专利
    • System and method for protecting a computer system from malicious software
    • 保护计算机系统免受恶意软件的系统和方法
    • USRE43500E1
    • 2012-07-03
    • US12720207
    • 2010-03-09
    • Allen F. RozmanAlfonso J. Cioffi
    • Allen F. RozmanAlfonso J. Cioffi
    • H04L29/06G06F11/00G06F12/14G06F12/16G08B23/00
    • H04L63/02G06F21/53G06F21/568G06F21/57H04L63/1408
    • In a computer system, a first electronic data processor is communicatively coupled to a first memory space and a second memory space. A second electronic data processor is communicatively coupled the second memory space and to a network interface device. The second electronic data processor is capable of exchanging data across a network of one or more computers via the network interface device. A video processor is adapted to combine video data from the first and second electronic data processors and transmit the combined video data to a display terminal for displaying the combined video data in a windowed format. The computer system is configured such that a malware program downloaded from the network and executing on the second electronic data processor is incapable of initiating access to the first memory space.
    • 在计算机系统中,第一电子数据处理器通信地耦合到第一存储器空间和第二存储器空间。 第二电子数据处理器通信地耦合第二存储器空间和网络接口设备。 第二电子数据处理器能够经由网络接口​​设备跨一个或多个计算机的网络交换数据。 视频处理器适于组合来自第一和第二电子数据处理器的视频数据,并将组合的视频数据发送到显示终端,以便以窗口格式显示组合的视频数据。 计算机系统被配置为使得从网络下载并在第二电子数据处理器上执行的恶意软件程序不能启动对第一存储器空间的访问。