会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Protecting the privacy of files referenced by their hash
    • 保护其散列引用的文件的隐私
    • US08095803B1
    • 2012-01-10
    • US11684534
    • 2007-03-09
    • Richard J. CarterMark S. MillerAlan H. Karp
    • Richard J. CarterMark S. MillerAlan H. Karp
    • G06F11/30G06F12/14
    • G06F21/6245
    • A storage manager provides data privacy, while preserving the benefits provided by existing hash based storage systems. Each file is assigned a unique identifying code. Hashes of the content-derived chunks of the file are calculated based on the content of the chunk and the code identifying the file. When a request to store a chunk of data is received, it is determined whether a chunk associated with the hash has already been stored. Because hashes are based on privacy-preserving codes as well as content, chunks of duplicate copies of a file need not be stored multiple times, and yet privacy is preserved for content at a file level. In other embodiments, hashes indicating whether a given file is public and/or indicating the identity of the requesting user are also sent with storage requests. These additional hashes enable more robust transmission and storage efficiency, while still preserving privacy.
    • 存储管理器提供数据隐私,同时保留现有基于哈希的存储系统提供的优点。 每个文件都被分配一个唯一的识别码。 基于块的内容和识别文件的代码来计算文件的内容导出块的哈希。 当接收到存储数据块的请求时,确定是否已经存储与散列相关联的块。 由于哈希是基于隐私保护代码以及内容,文件的重复副本的块不需要多次存储,而是保留文件级内容的隐私。 在其他实施例中,指示给定文件是公开的和/或指示请求用户的身份的散列也与存储请求一起发送。 这些额外的哈希可以实现更强大的传输和存储效率,同时保持隐私。
    • 7. 发明授权
    • Sensor and method for measuring changes in environmental conditions
    • 用于测量环境条件变化的传感器和方法
    • US06577402B1
    • 2003-06-10
    • US09583590
    • 2000-05-31
    • Mark S. Miller
    • Mark S. Miller
    • G01B902
    • G01B9/02023G01B9/02007G01B2290/25
    • A sensor has an interferometer which measures a change in an applied environmental condition relative to a reference environmental condition. The interferometer is operated under the applied environmental condition to generate an interference spectrum. Intensities of the interference spectrum are measured at first and second wavelengths, respectively. The first and second wavelengths correspond to first and second reference intensities that are separated from one another by an odd number of extrema in the interference spectrum when the interferometer is operated under the reference condition. Measurement of the change in the applied environmental condition is based on the measured intensities and the first and second reference intensities.
    • 传感器具有相对于参考环境条件来测量所施加的环境条件的变化的干涉仪。 干涉仪在施加的环境条件下运行以产生干涉光谱。 分别在第一和第二波长处测量干涉光谱的强度。 第一和第二波长对应于当干涉仪在参考条件下操作时在干涉光谱中彼此分离奇数个极值的第一和第二参考光强。 应用环境条件的变化的测量基于测量的强度和第一和第二参考强度。
    • 8. 发明授权
    • Distributed garbage collection system and method
    • 分布式垃圾收集系统及方法
    • US5960087A
    • 1999-09-28
    • US674114
    • 1996-07-01
    • E. Dean TribbleMark S. MillerNorman HardyJacob Y. LevyEric C. HillChristopher T. Hibbert
    • E. Dean TribbleMark S. MillerNorman HardyJacob Y. LevyEric C. HillChristopher T. Hibbert
    • G06F12/02H04L9/30H04L9/00G06F17/30
    • G06F12/0269G06F12/0261Y10S707/99953
    • A distributed garbage collection system and method is disclosed that is compatible with local ref-count or full garbage collection and that ensures that no local object's storage is deleted by the local garbage collector unless it is certain that there are no actual or potential remote references to that local object. The disclosed system and method are implemented in the context of a transparent distributed object system in which communications between objects in different processes are enabled by dedicated proxy objects that are linked to corresponding remote objects via a pair of transport objects. Additional proxy holder objects and proxy holder proxies ensure that objects for which third-party object references are passed (i.e., where one object in a first process passes a remote object in a second process a reference to a third object in a third process) are not collected until a direct link is established between the remote object in the second process and the third object in the third object space. As appropriate, secret number table pointers maintained by a local registrar for each object that has been accessed via a third party message are deleted, allowing the objects to be collected when there are no other actual or pending remote references to that object. The transport managers encrypt all inter-process messages so as to provide full capability security within the distributed system. This enables the disclosed garbage collection system and methods to operate under attack from misbehaving participants.
    • 公开了一种与本地引用计数或完全垃圾收集兼容的分布式垃圾回收系统和方法,并且确保本地对象的存储被本地垃圾收集器删除,除非确定没有实际或潜在的远程引用 那个地方的对象。 所公开的系统和方法在透明分布式对象系统的上下文中实现,其中通过经由一对传输对象链接到对应的远程对象的专用代理对象来启用不同进程中的对象之间的通信。 其他代理持有者对象和代理持有人代理确保传递第三方对象引用的对象(即,第一个进程中的一个对象在第二个进程中的远程对象在第三个进程中对第三个对象的引用) 在第二进程中的远程对象与第三对象空间中的第三对象之间建立直接链接之前,不会被收集。 适当地,删除了由本地注册器为通过第三方消息访问的每个对象维护的秘密号码表指针,从而允许当对该对象没有其他实际或挂起的远程引用时收集对象。 运输经理加密所有进程间消息,以便在分布式系统中提供全面的能力安全性。 这使得所公开的垃圾收集系统和方法能够在行为不端的参与者的攻击下进行操作。
    • 9. 发明授权
    • Capability security for transparent distributed object systems
    • 透明分布式对象系统的能力安全
    • US5781633A
    • 1998-07-14
    • US671307
    • 1996-07-01
    • E. Dean TribbleMark S. MillerNorman HardyChristopher T. HibbertEric C. Hill
    • E. Dean TribbleMark S. MillerNorman HardyChristopher T. HibbertEric C. Hill
    • G06F9/46H04L9/32G06F13/14
    • G06F9/468
    • A system providing capability security for distributed object systems is disclosed. The basic tenet of capability security is that the right to do something to an object (e.g., invoke a particular object's methods) is represented solely by the holding of a reference to that object. In each of the preferred embodiments described herein, an object is presumed to hold legitimately a reference to a particular object only if the object knows some unpublicized (except under the conditions required by capability security) key associated with the particular object. That is, an object's key is required along with the object's reference. So that capability security is preserved when object references are passed between objects in different processes, the object references being passed are encrypted upon transmission and then decrypted upon arrival at their intended destination. This cryptography can be performed by objects or processes using a variety of techniques, including Diffie-Helman or public/private key cryptography. The cryptography performed in the various embodiments ensures that only the intended recipient of the message can decode the object reference and that a misbehaving object cannot convince another object that it possesses a capability it does not have. Some of the disclosed embodiments provide capability security for transparent distributed object systems, wherein a pair of matched transports handle and encrypt inter-process communications between objects in their respective processes.
    • 公开了一种为分布式对象系统提供能力安全性的系统。 能力安全的基本原则是,仅仅通过保持对该对象的引用来表示对对象做某事的权利(例如,调用特定对象的方法)。 在本文描述的每个优选实施例中,假定对象仅在对象知道某些未公开的(在能力安全所要求的条件下除外)与该特定对象相关联的密钥时,才能合理地保持对特定对象的引用。 也就是说,对象的关键是与对象的引用一起需要的。 因此,当对象引用在不同进程中的对象之间传递时,能够保证能力安全性,所传递的对象引用在传输时被加密,然后在到达目的地时进行解密。 该密码术可以由使用各种技术的对象或进程执行,包括Diffie-Helman或公共/私人密钥密码术。 在各种实施例中执行的密码学确保仅消息的预期接收者可以解码对象引用,并且不良行为对象不能说服另一对象具有其不具有的能力。 所公开的实施例中的一些为透明分布式对象系统提供能力安全性,其中一对匹配的传输处理和加密各自进程中的对象之间的进程间通信。