会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Connection management in peer-to-peer content distribution clouds
    • 对等内容分发云中的连接管理
    • US07849196B2
    • 2010-12-07
    • US12097946
    • 2006-12-04
    • Christos GkantsidisJohn MillerManuel CostaPablo Rodriguez RodriguezStuart Ranson
    • Christos GkantsidisJohn MillerManuel CostaPablo Rodriguez RodriguezStuart Ranson
    • G06F15/173
    • H04L67/104H04L67/06H04L67/1085
    • A topology management process is implemented which involves removing or “tearing down” connections between nodes in certain situations in order to try to replace those connections with more optimal ones. Idle connections are torn down unless those are in a “notify” state; a notify state being one in which a request for content has been made to a neighbour but that neighbour has no available content as yet. Idle connections in a notify state are torn down only if they remain idle for a longer time than that required before an idle connection is torn down. To avoid problems caused by clusters of node forming and of loners being unable to join the cloud, network churn algorithms are taught. These involve requiring nodes to drop connections when specified conditions are met. Relative content distribution between connections is monitored and this information used to influence selection of those connections to drop.
    • 实现了拓扑管理过程,其涉及在某些情况下删除或“拆除”节点之间的连接,以便尝试用更优选的连接替换这些连接。 空闲连接被拆除,除非它们处于“通知”状态; 通知状态是向邻居做出对内容的请求的通知状态,但是该邻居还没有可用的内容。 通知状态下的空闲连接只有在空闲连接断开之前保持空闲时间较长的时间才会被拆除。 为了避免由于节点形成的簇和不能加入云的孤岛造成的问题,教授了网络流失算法。 这些涉及要求节点在满足指定条件时删除连接。 监视连接之间的相对内容分配,并将此信息用于影响这些连接的选择。
    • 5. 发明申请
    • Connection Management in Peer-to-Peer Content Distribution Clouds
    • 对等内容分发云中的连接管理
    • US20080294779A1
    • 2008-11-27
    • US12097946
    • 2006-12-04
    • Christos GkantsidisJohn MillerManuel CostaPablo Rodriguez RodriguezStuart Ranson
    • Christos GkantsidisJohn MillerManuel CostaPablo Rodriguez RodriguezStuart Ranson
    • G06F15/173
    • H04L67/104H04L67/06H04L67/1085
    • A topology management process is implemented which involves removing or “tearing down” connections between nodes in certain situations in order to try to replace those connections with more optimal ones. Idle connections are torn down unless those are in a “notify” state; a notify state being one in which a request for content has been made to a neighbour but that neighbour has no available content as yet. Idle connections in a notify state are torn down only if they remain idle for a longer time than that required before an idle connection is torn down. To avoid problems caused by clusters of node forming and of loners being unable to join the cloud, network churn algorithms are taught. These involve requiring nodes to drop connections when specified conditions are met. Relative content distribution between connections is monitored and this information used to influence selection of those connections to drop.
    • 实现了拓扑管理过程,其涉及在某些情况下删除或“拆除”节点之间的连接,以便尝试用更优选的连接替换这些连接。 空闲连接被拆除,除非它们处于“通知”状态; 通知状态是向邻居做出对内容的请求的通知状态,但是该邻居还没有可用的内容。 通知状态下的空闲连接只有在空闲连接断开之前保持空闲时间较长的时间才会被拆除。 为了避免由于节点形成的簇和不能加入云的孤岛造成的问题,教授了网络流失算法。 这些涉及要求节点在满足指定条件时删除连接。 监视连接之间的相对内容分配,并将此信息用于影响这些连接的选择。
    • 10. 发明申请
    • Securing Software By Enforcing Data Flow Integrity
    • 通过执行数据流完整性来保护软件
    • US20090282393A1
    • 2009-11-12
    • US12306188
    • 2007-05-04
    • Manuel CostaMiguel CastroTim Harris
    • Manuel CostaMiguel CastroTim Harris
    • G06F9/06
    • G06F21/54G06F21/52
    • The majority of such software attacks exploit software vulnerabilities or flaws to write data to unintended locations. For example, control-data attacks exploit buffer overflows or other vulnerabilities to overwrite a return address in the stack, a function pointer, or some other piece of control data. Non-control-data attacks exploit similar vulnerabilities to overwrite security critical data without subverting the intended control flow in the program. We describe a method for securing software against both control-data and non-control-data attacks. A static analysis is carried out to determine data flow information for a software program. Data-flow tracking instructions are formed in order to track data flow during execution or emulation of that software. Also, checking instructions are formed to check the tracked data flow against the static analysis results and thereby identify potential attacks or errors. Optional optimisations are described to reduce the resulting additional overheads.
    • 大多数此类软件攻击利用软件漏洞或漏洞将数据写入非预期位置。 例如,控制数据攻击利用缓冲区溢出或其他漏洞来覆盖堆栈中的返回地址,函数指针或其他一些控制数据。 非控制数据攻击利用类似的漏洞来覆盖安全关键数据,而不会破坏程序中的预期控制流程。 我们描述一种保护软件免受控制数据和非控制数据攻击的方法。 进行静态分析以确定软件程序的数据流信息。 形成数据流跟踪指令,以便在执行或仿真该软件期间跟踪数据流。 此外,形成检查指令以根据静态分析结果检查跟踪的数据流,从而识别潜在的攻击或错误。 描述可选优化,以减少所产生的额外开销。