会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Method and system for choosing a queue protection key that is tamper-proof from an application
    • 从应用程序中选择防篡改的队列保护密钥的方法和系统
    • US06851059B1
    • 2005-02-01
    • US09692353
    • 2000-10-19
    • Gregory Francis PfisterRenato John RecioDanny Marvin NealSteven Mark Thurber
    • Gregory Francis PfisterRenato John RecioDanny Marvin NealSteven Mark Thurber
    • H04L9/00H04L29/06
    • H04L63/06
    • A method for enabling a Q_key that is tamper proof from applications on a distributed computer system to protect selected network operations is provided. Applications and an operating system (OS) execute on the end nodes and each may access various network resources. In the invention, the network resources are configured for selective access by particular applications or OS.In a preferred embodiment, a control bit of a Q_key, which allows applications to authenticate their use of particular communication resources, i.e., the send and receive queues, is reserved and utilized to signal whether a particular application is allowed access to the resources. Setting the control bit to 0 allows the Q_key to be set by an application directly. When the control bit is set to 1, the Q_key cannot be set by an application and can only be set using a privileged operation performed only by the OS.
    • 提供了一种用于启用防止来自分布式计算机系统上的应用程序的防篡改的Q_key以保护所选网络操作的方法。 应用和操作系统(OS)在终端节点上执行,每个可以访问各种网络资源。 在本发明中,网络资源被配置用于特定应用或OS的选择性访问。在优选实施例中,Q_key的控制位允许应用程序认证其对特定通信资源的使用,即发送和接收队列, 被保留并用于发出特定应用是否被允许访问资源。 将控制位设置为0允许应用程序直接设置Q_key。 当控制位设置为1时,Q_key不能由应用程序设置,只能使用仅由操作系统执行的特权操作进行设置。
    • 3. 发明授权
    • System area network of end-to-end context via reliable datagram domains
    • 通过可靠的数据报域,端到端上下文的系统区域网络
    • US06990528B1
    • 2006-01-24
    • US09692354
    • 2000-10-19
    • Danny Marvin NealRenato John RecioSteven Mark Thurber
    • Danny Marvin NealRenato John RecioSteven Mark Thurber
    • G06F15/16
    • G06F3/0659G06F3/0605G06F3/067
    • A method for associating reliable datagram queue pairs with an underlying end-to-end context of a channel adapter is provided. The method comprises storing a reliable datagram domain (RDD) within the context of a reliable datagram queue pair (RD QP). The same RDD is stored within an end-to-end context (EEC). A partitioning key (P—key) is also stored within the EEC. The RDD cannot be accessed by consumer processes. In the case of incoming messages, the P—keys of the incoming data packet and EEC are compared. If P—keys match, then the RDD's of the RD QP and EEC are compared. If the RDD's match, the packet is processed normally. In the case of outgoing messages, the RDD's of the RD QP and EEC are first compared, and if they match, the P—Key of the EEC is inserted into the transport header of the data packet.
    • 提供了一种用于将可靠数据报队列对与信道适配器的底层端到端上下文相关联的方法。 该方法包括在可靠数据报队列对(RD QP)的上下文中存储可靠数据报域(RDD)。 相同的RDD存储在端到端上下文(EEC)中。 分区键(P - 键)也存储在EEC中。 消费者进程无法访问RDD。 在传入消息的情况下,比较输入数据包和EEC的P - 键。 如果P - 键匹配,则比较RD QP和EEC的RDD。 如果RDD匹配,则该分组被正常处理。 在传出消息的情况下,首先比较RD QP和EEC的RDD,如果匹配,则将EEC的密钥插入到数据包的传输报头中。
    • 9. 发明授权
    • Method and system for reliably defining and determining timeout values in unreliable datagrams
    • 用于在不可靠数据报中可靠地定义和确定超时值的方法和系统
    • US06748559B1
    • 2004-06-08
    • US09692349
    • 2000-10-19
    • Gregory Francis PfisterGiles Roger FrazierDanny Marvin NealSteven Mark Thurber
    • Gregory Francis PfisterGiles Roger FrazierDanny Marvin NealSteven Mark Thurber
    • G06F1100
    • H04L41/00H04L41/046H04L41/0806H04L41/082H04L41/12H04L43/0852
    • A method for managing allocation of network resources within the distributed computer system is provided. Specifically, the network traversal time and the end node response time for requests and/or packets being routed in a switch-connected system area network are utilized to determine the total round trip time for completion of the particular network operation. The sum of the timeout values for all switches that participate in routing the request from a requester (source) to the receptor node (target) is provided to the requester's channel adapter (CA). The time-out values are provided by the switch manufacturer and are sent to a network Subnet Manager (SM) via SM packets (SMP). The timeout values added together represent the SubnetTimeout. The time-out value of the target channel adapter (CA), the ResponseTime, is also provided to the requester. The requester then utilizes one of two timeout equations to calculate the overall response time required for the request to be completed. A timer is started and the elapsed time to complete the request is monitored and compared with the overall response time calculated. When the timer expires before a response is received at the requester, the operation is assumed to have failed and the network resources being utilized by the request may be reallocated to another network operation.
    • 提供了一种管理分布式计算机系统内网络资源分配的方法。 具体地,利用在交换机连接的系统区域网络中路由的请求和/或分组的网络遍历时间和终止节点响应时间来确定完成特定网络操作的总往返时间。 参与将请求从请求者(源)路由到接收节点(目标)的所有交换机的超时值的总和提供给请求者的信道适配器(CA)。 超时值由交换机制造商提供,并通过SM数据包(SMP)发送到网络子网管理器(SM)。 添加的超时值表示SubnetTimeout。 目标通道适配器(CA)的超时值ResponseTime也提供给请求者。 然后,请求者使用两个超时方程之一来计算请求完成所需的总体响应时间。 启动定时器,并监视完成请求的经过时间,并与计算的总响应时间进行比较。 当定时器在请求者接收到响应之前到期时,假设该操作已经失败,并且该请求所利用的网络资源可能被重新分配到另一个网络操作。