会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and apparatus for loading multiple animated images on a web-page
with limited network throughput
    • 用于以有限的网络吞吐量在网页上加载多个动画图像的方法和装置
    • US6157933A
    • 2000-12-05
    • US979039
    • 1997-11-26
    • Joseph Celi, Jr.Wendi Lynn NusbickelGlen Robert WaltersVictor Stuart Moore
    • Joseph Celi, Jr.Wendi Lynn NusbickelGlen Robert WaltersVictor Stuart Moore
    • G06F17/30G06F3/14
    • G06F17/30899
    • A method and apparatus for loading multiple animated images on a Web page during browsing over a network with limited bandwidth. The method comprising the steps of: (1) retrieving hypertext objects containing a Java applet from servers over a network into a browser utilizing a Java engine for running Java applets; (2) displaying a default image and default image effects by the Java applet; and (3) the Java applet retrieving a target image series comprising a series of related images from the server and loading the target image series one image at a time with screen transition effects in between each image so that a speed of the screen transition effects is set to finish when a next image in the image series is retrieved over the network of limited bandwidth and prepared for loading by said Java applet, thereby making the speed of the screen transition effects proportional to a time required to retrieved the next image in the image series.In another embodiment, an apparatus and computer readable medium carries out the method above.
    • 一种用于在通过有限带宽的网络浏览期间在网页上加载多个动画图像的方法和装置。 该方法包括以下步骤:(1)通过网络将服务器中包含Java小应用程序的超文本对象从运行Java applet的Java引擎中浏览到浏览器; (2)通过Java applet显示默认图像和默认图像效果; (3)Java小程序检索包括来自服务器的一系列相关图像的目标图像序列,并且每次图像之间的屏幕转换效果一次加载目标图像序列一个图像,使得屏幕转变效果的速度为 当通过有限带宽的网络检索图像系列中的下一个图像并准备用于由所述Java小应用程序加载时,设置为完成,从而使屏幕转换的速度与检索图像中的下一个图像所需的时间成比例 系列。 在另一个实施例中,装置和计算机可读介质执行上述方法。
    • 2. 发明授权
    • Outside access to computer resources through a firewall
    • 通过防火墙外部访问计算机资源
    • US6061797A
    • 2000-05-09
    • US132915
    • 1998-08-12
    • Prashanth JadeVictor Stuart MooreArun Mohan RaoGlen Robert Walters
    • Prashanth JadeVictor Stuart MooreArun Mohan RaoGlen Robert Walters
    • G06F13/00G06F12/14G06F13/36H04L12/56H04L12/66H04L29/06G06F13/16H04L9/32
    • H04L63/0272H04L29/06H04L63/029
    • A firewall isolates computer and network resources inside the firewall from networks, computers and computer applications outside the firewall. Typically, the inside resources could be privately owned databases and local area networks (LAN's), and outside objects could include individuals and computer applications operating through public communication networks such as the Internet. Usually, a firewall allows for an inside user or object to originate connection to an outside object or network, but does not allow for connections to be generated in the reverse direction; i.e. from outside in. The disclosed invention provides a special "tunneling" mechanism, operating on both sides of a firewall, for establishing such "outside in" connections when they are requested by certain "trusted" individuals or objects or applications outside the firewall. The intent here is to minimize the resources required for establishing "tunneled" connections (connections through the firewall that are effectively requested from outside), while also minimizing the security risk involved in permitting such connections to be made at all. The mechanism includes special tunneling applications, running on interface servers inside and outside the firewall, and a special table of "trusted sockets" created and maintained by the inside tunneling application. Entries in the trusted sockets table define objects inside the firewall consisting of special inside ports, a telecommunication protocol to be used at each port, and a host object associated with each port. Each entry is "trusted" in the sense that it is supposedly known only by individuals authorized to have "tunneling" access through the firewall from outside.
    • 一个防火墙将计算机和网络资源隔离在防火墙之外的网络,计算机和计算机应用程序之外。 通常,内部资源可以是私有数据库和局域网(LAN),外部对象可以包括通过公共通信网络(例如因特网)操作的个体和计算机应用。 通常,防火墙允许内部用户或对象发起与外部对象或网络的连接,但不允许在相反方向上生成连接; 所述公开的发明提供了在防火墙的两侧操作的特殊的“隧道”机制,用于当某些“受信任”的个人或防火墙之外的对象或应用程序请求时,建立这样的“外部”连接。 这里的意图是尽可能减少建立“隧道”连接所需的资源(通过外部有效请求的防火墙的连接),同时最大限度地减少允许完全进行连接的安全风险。 该机制包括在防火墙内外的接口服务器上运行的特殊隧道应用程序,以及内部隧道应用程序创建和维护的“可信套接字”特殊表。 可信套接字表中的条目定义了由特殊内部端口组成的防火墙内的对象,每个端口使用的电信协议以及与每个端口相关联的主机对象。 每个条目都是“受信任的”,因为它被认为只有被授权从外部通过防火墙进行“隧道”访问的人才知道。
    • 3. 发明授权
    • Outside access to computer resources through a firewall
    • 通过防火墙外部访问计算机资源
    • US5944823A
    • 1999-08-31
    • US731800
    • 1996-10-21
    • Prashanth JadeVictor Stuart MooreArun Mohan RaoGlen Robert Walters
    • Prashanth JadeVictor Stuart MooreArun Mohan RaoGlen Robert Walters
    • G06F13/00G06F12/14G06F13/36H04L12/56H04L12/66H04L29/06G06F11/00
    • H04L63/0272H04L29/06H04L63/029
    • A firewall isolates computer and network resources inside the firewall from networks, computers and computer applications outside the firewall. Typically, the inside resources could be privately owned databases and local area networks (LAN's), and outside objects could include individuals and computer applications operating through public communication networks such as the Internet. Usually, a firewall allows for an inside user or object to originate connection to an outside object or network, but does not allow for connections to be generated in the reverse direction; i.e. from outside in. The disclosed invention provides a special "tunneling" mechanism, operating on both sides of a firewall, for establishing such "outside in" connections when they are requested by certain "trusted" individuals or objects or applications outside the firewall. The intent here is to minimize the resources required for establishing "tunneled" connections (connections through the firewall that are effectively requested from outside), while also minimizing the security risk involved in permitting such connections to be made at all. The mechanism includes special tunneling applications, running on interface servers inside and outside the firewall, and a special table of "trusted sockets" created and maintained by the inside tunneling application. Entries in the trusted sockets table define objects inside the firewall consisting of special inside ports, a telecommunication protocol to be used at each port, and a host object associated with each port. Each entry is "trusted" in the sense that it is supposedly known only by individuals authorized to have "tunneling" access through the firewall from outside. These applications use the table to effect connections through the firewall in response to outside requests identifying valid table entries.
    • 一个防火墙将计算机和网络资源隔离在防火墙之外的网络,计算机和计算机应用程序之外。 通常,内部资源可以是私有数据库和局域网(LAN),外部对象可以包括通过公共通信网络(例如因特网)操作的个体和计算机应用。 通常,防火墙允许内部用户或对象发起与外部对象或网络的连接,但不允许在相反方向上生成连接; 所述公开的发明提供了在防火墙的两侧操作的特殊的“隧道”机制,用于当某些“受信任”的个人或防火墙之外的对象或应用程序请求时,建立这样的“外部”连接。 这里的意图是尽可能减少建立“隧道”连接所需的资源(通过外部有效请求的防火墙的连接),同时最大限度地减少允许完全进行连接的安全风险。 该机制包括在防火墙内外的接口服务器上运行的特殊隧道应用程序,以及内部隧道应用程序创建和维护的“可信套接字”特殊表。 可信套接字表中的条目定义了由特殊内部端口组成的防火墙内的对象,每个端口使用的电信协议以及与每个端口相关联的主机对象。 每个条目都是“受信任的”,因为它被认为只有被授权从外部通过防火墙进行“隧道”访问的人才知道。 这些应用程序使用该表来响应外部请求识别有效的表条目来实现通过防火墙的连接。