会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Anti-virus method based on security chip
    • 基于安全芯片的防病毒方法
    • US08132257B2
    • 2012-03-06
    • US12159334
    • 2006-03-23
    • Jun LiKai WangRongfeng FengNa Xu
    • Jun LiKai WangRongfeng FengNa Xu
    • G06F11/00
    • G06F21/575G06F21/567
    • An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by a hashing operation for a computer key file and a system control program are stored in a memory of the security chip, and a backup file of the computer key file is stored in a backup storage area. When power up, the integrity of the system control program is verified by using the hash value of the system control program stored in the memory of the security chip. If the system control program is integral, a control is executed by the system control program, and the system control program verifies the integrity of the computer key file using the hash value of the computer key file stored in the memory of the security chip. If all the computer key files are integral, the operating system is started; on the contrary, if any of the computer key file is not integral, it will be restored using the backup file of the computer key file stored in the backup storage area.
    • 提供了一种基于本发明的安全芯片的防病毒方法。 该方法包括以下步骤:通过用于计算机密钥文件和系统控制程序的散列操作获得的散列值被存储在安全芯片的存储器中,计算机密钥文件的备份文件被存储在备份存储器 区。 上电时,通过使用存储在安全芯片的存储器中的系统控制程序的散列值来验证系统控制程序的完整性。 如果系统控制程序是整体的,则由系统控制程序执行控制,并且系统控制程序使用存储在安全芯片的存储器中的计算机密钥文件的散列值来验证计算机密钥文件的完整性。 如果所有的计算机密钥文件是一体的,则操作系统启动; 相反,如果计算机密钥文件中的任何一个不是整体的,则将使用存储在备份存储区域中的计算机密钥文件的备份文件进行恢复。
    • 2. 发明申请
    • ANTI-VIRUS METHOD BASED ON SECURITY CHIP
    • 基于安全芯片的反病毒方法
    • US20090144582A1
    • 2009-06-04
    • US12159334
    • 2006-03-23
    • Jun LiKai WangRongfeng FengNa Xu
    • Jun LiKai WangRongfeng FengNa Xu
    • G06F11/00
    • G06F21/575G06F21/567
    • An anti-virus method based on a security chip according to the present invention is provided. The method comprises the following steps: a hash value obtained by a hashing operation for a computer key file and a system control program are stored in a memory of the security chip, and a backup file of the computer key file is stored in a backup storage area. When power up, the integrity of the system control program is verified by using the hash value of the system control program stored in the memory of the security chip. If the system control program is integral, a control is executed by the system control program, and the system control program verifies the integrity of the computer key file using the hash value of the computer key file stored in the memory of the security chip. If all the computer key files are integral, the operating system is started; on the contrary, if any of the computer key file is not integral, it will be restored using the backup file of the computer key file stored in the backup storage area.
    • 提供了一种基于本发明的安全芯片的防病毒方法。 该方法包括以下步骤:通过用于计算机密钥文件和系统控制程序的散列操作获得的散列值被存储在安全芯片的存储器中,计算机密钥文件的备份文件被存储在备份存储器 区。 上电时,通过使用存储在安全芯片的存储器中的系统控制程序的散列值来验证系统控制程序的完整性。 如果系统控制程序是整体的,则由系统控制程序执行控制,并且系统控制程序使用存储在安全芯片的存储器中的计算机密钥文件的散列值来验证计算机密钥文件的完整性。 如果所有的计算机密钥文件是一体的,则操作系统启动; 相反,如果计算机密钥文件中的任何一个不是整体的,则将使用存储在备份存储区域中的计算机密钥文件的备份文件进行恢复。
    • 3. 发明申请
    • Application management and execution system and method thereof
    • 应用管理与执行系统及其方法
    • US20090019437A1
    • 2009-01-15
    • US12215783
    • 2008-06-30
    • Rongfeng FengYang LinMin HuKai Wang
    • Rongfeng FengYang LinMin HuKai Wang
    • G06F9/455
    • G06F21/53
    • The invention discloses an application management and execution system and a method thereof. The application management and execution system comprises a virtual machine monitor for managing at least one virtual machine; the at least one virtual machine for processing at least one application, and storing, separately and respectively, application data used by each application and platform data required by the virtual machine for processing the application in one or more storage disk (persistent storage), and reading the application data and the platform data from the one or more storage devices respectively. The at least one application executing on the virtual machine may share the platform data in the one or more storage devices. When the virtual machine executes the at least one application, it may modify the application data in the storage devices.
    • 本发明公开了一种应用管理和执行系统及其方法。 应用管理和执行系统包括用于管理至少一个虚拟机的虚拟机监视器; 用于处理至少一个应用的至少一个虚拟机,以及分别和分别地存储每个应用使用的应用数据和虚拟机所需的用于在一个或多个存储盘(持久存储器)中处理应用)所需的平台数据;以及 分别从一个或多个存储设备读取应用数据和平台数据。 在虚拟机上执行的至少一个应用程序可以在一个或多个存储设备中共享平台数据。 当虚拟机执行至少一个应用程序时,它可以修改存储设备中的应用程序数据。
    • 10. 发明授权
    • Piston assembly and connecting rod having a profiled wrist pin bore therefor
    • 活塞组件和连杆具有成型的手腕销孔
    • US08539928B2
    • 2013-09-24
    • US12330932
    • 2008-12-09
    • Roberto Bueno NigroKai Wang
    • Roberto Bueno NigroKai Wang
    • F02B75/32
    • F02F3/00F02B23/0672F02B23/0693F16C9/04F16C23/041F16C33/10F16J1/16Y02T10/125
    • A piston assembly and connecting rod therefor is provided. The connecting rod has an elongate body extending to an end for operable attachment to a piston. The end has a wrist pin bore extending between opposite sides of the body. The wrist pin bore has a wavy profile extending between the sides. The wavy profile has at least one concave surface with a valley extending along a circumferential direction of the wrist pin bore and convex surfaces having peaks extending along a circumferential direction of the wrist pin bore on laterally opposite sides of the valley. The peaks and valleys cooperate to form a smooth load gradient and uniform lubrication flow across the interface region between the wrist pin bore and the wrist pin extending therethrough.
    • 提供一种活塞组件及其连接杆。 连杆具有延伸到端部的细长主体以可操作地附接到活塞。 该端部具有在主体的相对侧之间延伸的腕销孔。 腕针孔具有在两侧之间延伸的波状轮廓。 波浪形轮廓具有至少一个凹形表面,其具有沿着腕针孔的圆周方向延伸的谷部,并且凸起表面具有沿着在山谷的横向相对侧上的腕针孔的圆周方向延伸的峰部。 峰和谷合作形成平滑的载荷梯度,并且穿过腕针孔和延伸穿过其的腕针之间的界面区域的均匀润滑流。