会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明授权
    • TRACKING THE TRANSMISSION OF WEB DOCUMENTS OR FILES SENT FROM RESOURCE LOCATIONS THROUGH SERVERS ON THE WEB TO CLIENT COMPUTER STATIONS WHICH SEND TRACKED TRANSMISSION CHARACTERISTICS DATA BACK TO SAID SERVERS
    • 跟踪通过网络上的服务器的资源位置传输的WEB文档或文件传输到客户端计算机站,发送跟踪传输特性数据返回到服务器
    • US06785723B1
    • 2004-08-31
    • US09599178
    • 2000-06-22
    • Denise Marie GentyGerald Francis McBreartyShawn Patrick MullenJohnny Meng-Han Shieh
    • Denise Marie GentyGerald Francis McBreartyShawn Patrick MullenJohnny Meng-Han Shieh
    • G06F15173
    • H04L41/06G06F17/30899
    • Tracking the success or failure of and the quality of communications between requesting client station computers and servers, particularly servers for accessing resource locations for the present complex and circuitous environment. Conventional browsers are provided for requesting the transmission of data components from one of said resource locations to one of said client stations. There are also implementations, associated with the client station requesting the transmission of data components, for tracking characteristics of said transmission in combination with sending said tracked characteristics to at least one network server on the path of said transmission. In the complex World Wide Web (Web) environment, while the resource location server does not know where its thousand of “hits” are coming from, each requesting client station of those thousands does know the Uniform Resource Locator (URL) or address of the server. Thus, the properties and characteristics of the transmission from the resource location are tracked at the requesting client station. Then, after a request and resulting transmission, or in the case of a failed transmission, after the first successful transmission after the failed transmission, the requesting client location sends tracked data to the server relative to the failed transmission, as well as any data pertinent to the successful transmission.
    • 跟踪请求的客户端计算机和服务器之间的通信的成功或失败以及质量,特别是用于访问当前复杂和迂回环境的资源位置的服务器。 传统浏览器被提供用于请求将数据组件从所述资源位置之一传输到所述客户站之一。 还有与客户端站请求传输数据组件相关联的实现,用于跟踪所述传输的特性,并结合在所述传输路径上向所述至少一个网络服务器发送所述跟踪特性。 在复杂的万维网(Web)环境中,虽然资源定位服务器不知道其“命中”来自哪里,但这些千位的每个请求客户端都知道统一资源定位符(URL)或 服务器。 因此,在请求的客户站跟踪来自资源位置的传输的属性和特性。 然后,在请求和结果传输之后,或者在发送失败的情况下,在发送失败之后的第一次成功发送之后,请求客户端位置相对于发生故障的发送发送跟踪的数据到服务器,以及任何有关的数据 成功传输。
    • 9. 发明授权
    • Automatically hiding sensitive information obtainable from a process table
    • 自动隐藏从进程表获取的敏感信息
    • US07827614B2
    • 2010-11-02
    • US12125732
    • 2008-05-22
    • Denise Marie GentyShawn Patrick MullenJames Stanley Tesauro
    • Denise Marie GentyShawn Patrick MullenJames Stanley Tesauro
    • G06F17/30
    • G06F21/31G06F21/6245
    • The present invention provides a system and method for automatically hiding sensitive information, obtainable from a process table, from other processes that should not access the sensitive information. The system and method include a sensitive command attribute table that is used by a system administrator to designate the commands and command attributes that will typically be associated with sensitive information. The sensitive command attribute table is used when a command is entered that requests information from the process table to be displayed or output. In response, a search of the process table entries is made to determine if a command and/or its attribute in the process table matches an entry in the sensitive command attribute table. If so, the command, its attributes, and/or its attribute values are blanked from the output of the process table information.
    • 本发明提供了一种系统和方法,用于从不能访问敏感信息的其他进程自动隐藏从进程表获得的敏感信息。 系统和方法包括一个敏感的命令属性表,由系统管理员用于指定通常与敏感信息相关联的命令和命令属性。 当输入请求来自进程表的信息以显示或输出的命令时,使用敏感命令属性表。 作为响应,进行对进程表条目的搜索以确定进程表中的命令和/或其属性是否与敏感命令属性表中的条目匹配。 如果是,则从进程表信息的输出中删除命令,其属性和/或其属性值。
    • 10. 发明授权
    • Write protection of subroutine return addresses
    • 写子保护子程序返回地址
    • US07467272B2
    • 2008-12-16
    • US11014111
    • 2004-12-16
    • Denise Marie GentyShawn Patrick MullenJames Stanley Tesauro
    • Denise Marie GentyShawn Patrick MullenJames Stanley Tesauro
    • G06F12/00
    • G06F12/1466
    • Exemplary methods, systems, and products are described that operate generally by moving subroutine return address protection to the processor itself, in effect proving atomic locks for subroutine return addresses stored in a stack, subject to application control. More particularly, exemplary methods, systems, and products are described that write protect subroutine return addresses by calling a subroutine, including storing in a stack memory address a subroutine return address and locking, by a computer processor, the stack memory address against write access. Calling a subroutine may include receiving in the computer processor an instruction to lock the stack memory address. Locking the stack memory address may be carried out by storing the stack memory address in a protected memory lockword. A protected memory lockword may be implemented as a portion of a protected content addressable memory.
    • 描述了通常通过将子程序返回地址保护移动到处理器本身的示例性方法,系统和产品,实际上证明了存储在堆栈中的子程序返回地址的原子锁,在应用程序控制下。 更具体地,描述了示例性方法,系统和产品,其通过调用子程序来写入保护子程序返回地址,包括在堆栈存储器地址中存储地址子程序返回地址并由计算机处理器锁定堆栈存储器地址以防写入访问。 调用子程序可以包括在计算机处理器中接收锁定堆栈存储器地址的指令。 锁定堆栈存储器地址可以通过将堆栈存储器地址存储在受保护的存储器锁定字中来执行。 受保护的存储器锁字可以被实现为受保护内容可寻址存储器的一部分。