会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • Secure storage of data in a network
    • 安全地存储网络中的数据
    • US20050240749A1
    • 2005-10-27
    • US11095507
    • 2005-04-01
    • Gary ClemoRussell HainesTimothy Lewis
    • Gary ClemoRussell HainesTimothy Lewis
    • G06F3/06G06F12/00G06F12/14G06F17/30G06F21/62H04L29/06
    • G06F3/0638G06F3/062G06F3/067G06F16/10G06F21/6218G06F2221/2129G06F2221/2149
    • A method of storing an item of data is described, performed in a general purpose computer in a network, and comprises identifying available storage means in the network, gathering information concerning the availability of data storage capacity in the identified available storage means, fragmenting the item of data in accordance with a fragmentation policy and distributing resultant fragments of data, in accordance with a distribution policy, among the identified available storage means. A computer apparatus is also described, operable in a network for managing and effecting storage of an item of data in a remote storage location in said network, and comprises storage space identification means for identifying network accessible storage means in the network, storage availability information gathering means for gathering information concerning the availability of data storage capacity in the available storage means, fragmentation means for fragmenting the item of data in accordance with a fragmentation policy and distribution means for distributing resultant fragments of data, in accordance with a distribution policy, among the identified available storage means.
    • 描述了存储数据项的方法,在网络中的通用计算机中执行,并且包括识别网络中的可用存储装置,收集关于所识别的可用存储装置中的数据存储容量的可用性的信息,将该项目分段 的数据,并且根据分发策略在所识别的可用存储装置之间分发数据的结果片段。 还描述了一种计算机设备,可在网络中操作以管理和实现在所述网络中的远程存储位置中的数据项的存储,并且包括用于识别网络中的网络可访问存储装置的存储空间识别装置,存储可用性信息收集 用于收集关于可用存储装置中的数据存储容量的可用性的信息的装置,用于根据分段策略和分发装置分割数据项的分段装置,用于根据分发策略分发所产生的数据片段 识别可用存储装置。
    • 5. 发明授权
    • Data transfer to a non-volatile storage medium
    • US6145068A
    • 2000-11-07
    • US931330
    • 1997-09-16
    • Timothy Lewis
    • Timothy Lewis
    • G06F1/30G06F1/00G06F3/06G06F9/445G06F9/46G06F9/48G06F11/14G06F12/16H03M7/00G06F12/00H03M7/30
    • G06F9/4418
    • To improve the speed of transition to the zero-volt suspend state, system context is saved from volatile random access memory to non-volatile memory, such as a hard disk, using a compression algorithm which speeds the transfer of data to non-volatile memory by recognizing data pages having bytes of a single value. The system context in extended memory of RAM consists of a number of system context memory blocks, and between these memory blocks are memory holes containing information which does not require storage. Initially, the entirety of data in a buffer region of RAM is stored directly to disk. Then, successive pages from each system context memory block are transferred to the buffer, where the page size corresponds to the memory management unit page size. When testing locates a region of heterogeneous entries, then a heterogeneous-data flag, the length of the heterogeneous region, and the heterogeneous data region are transferred to the buffer. When testing determines that a page contains bytes of a single value, then a compression flag representing that value is substituted for that page. When a memory hole is reached, a memory hole flag and the size of the memory hole are transferred to the buffer. On each transfer of a byte of data to the buffer it is determined whether the buffer is full, and when it is full then a write-to-disk is performed. To transition from the zero-volt suspend state back to an operational state, bytes are transferred from the hard disk to the buffer whenever all the bytes currently in the buffer have been transferred to extended memory. When testing of the buffer entries locates a heterogeneous-data flag, the value immediately following the flag is determined, and a data region having a length of that value is transferred to extended memory. When a compression flag is found, a 4 kilobyte page of the corresponding byte value is transferred to extended memory. When a memory hole flag is found, a memory hole with a length of the value immediately following the memory hole flag is created in extended memory.
    • 6. 发明申请
    • Secure software SMI dispatching using caller address
    • 使用来电者地址安全软件SMI调度
    • US20050114578A1
    • 2005-05-26
    • US11025194
    • 2004-12-28
    • Timothy Lewis
    • Timothy Lewis
    • G06F9/46G06F1/00G06F9/48G06F21/00G06F13/24
    • G06F21/577G06F2221/2105
    • A system and method securely transfer control to a system management mode (SMM) in response to an SMI by referencing the address of a calling instruction that generated the SMI with a dispatch table only visible in SMM. The entries in the dispatch table provide links between the calling instruction and its target function. To create the dispatch table, a macro can be inserted in the source code of a software product being built that designates a target function. During compilation, the inserted macro is located, and an entry is created linking the calling instruction and the target function. The calling instruction in the final software product provides no indication of the address of the target function.
    • 系统和方法通过使用仅在SMM中可见的调度表来引用生成SMI的调用指令的地址来将控制安全地传送到响应于SMI的系统管理模式(SMM)。 调度表中的条目提供了调用指令与其目标函数之间的链接。 要创建调度表,可以在正在构建的指定目标函数的软件产品的源代码中插入一个宏。 在编译期间,插入的宏被定位,并创建一个链接调用指令和目标函数的条目。 最终软件产品中的调用指令不提供目标功能地址的指示。