会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Trusted hardware component for distributed systems
    • 分布式系统的可信硬件组件
    • US09455992B2
    • 2016-09-27
    • US12483338
    • 2009-06-12
    • John R. DouceurDavid M LevinJacob R. LorchThomas Moscibroda
    • John R. DouceurDavid M LevinJacob R. LorchThomas Moscibroda
    • G06F15/16H04L29/06H04L9/32
    • H04L63/123H04L9/3247H04L29/06H04L2209/127
    • Techniques for utilizing trusted hardware components for mitigating the effects of equivocation amongst participant computing devices of a distributed system are described herein. For instance, a distributed system employing a byzantine-fault-resilient protocol—that is, a protocol intended to mitigate (e.g., tolerate, detect, isolate, etc.) the effects of byzantine faults—may employ the techniques. To do so, the techniques may utilize a trusted hardware component comprising a non-decreasing counter and a key. This hardware component may be “trusted” in that the respective participant computing device cannot modify or observe the contents of the component in any manner other than according to the prescribed procedures, as described herein. Furthermore, the trusted hardware component may couple to the participant computing device in any suitable manner, such as via a universal serial bus (USB) connection or the like.
    • 在此描述了利用可信硬件组件来减轻分布式系统的参与者计算设备之间的混淆效应的技术。 例如,采用拜占庭故障弹性协议的分布式系统 - 即旨在减轻(例如,容忍,检测,隔离等)拜占庭故障的影响的协议 - 可以采用这些技术。 为了这样做,这些技术可以利用包括非递减计数器和密钥的可信硬件组件。 该硬件组件可能是“可信赖的”,因为如本文所述,相应的参与者计算设备不能以除了根据规定的过程之外的任何方式修改或观察组件的内容。 此外,可信硬件组件可以以任何合适的方式,例如经由通用串行总线(USB)连接等耦合到参与者计算设备。
    • 6. 发明授权
    • Method and system for regulating background tasks using performance measurements
    • 使用性能测量来调整后台任务的方法和系统
    • US07716672B2
    • 2010-05-11
    • US11009655
    • 2004-12-10
    • John R. DouceurWilliam J. Bolosky
    • John R. DouceurWilliam J. Bolosky
    • G06F9/46
    • G06F9/4881
    • A method and system for regulating tasks of background processes so as to reduce interference with foreground processes. The progress rate of a background task (e.g., amount of work performed per unit time) is measured and evaluated against a target amount. If the progress rate appears degraded, the background task is suspended for a computed time interval so as to back off from its interference with a foreground process. Each time the progress rate appears degraded, the time interval is exponentially increased from its previous value up to a maximum, however if the performance appears normal, the time interval is reset to a minimum. Evaluation of the work is statistically based so as to eliminate variations in measurements, and automatic calibration of the target amount is provided, as is a mechanism for prioritizing multiple background tasks.
    • 一种用于调整后台进程任务的方法和系统,以减少对前台进程的干扰。 根据目标量测量和评估后台任务的进度(例如,每单位时间执行的工作量)。 如果进度速率出现降级,则后台任务将暂停计算的时间间隔,以避免其与前台进程的干扰。 每次进度出现退化时,时间间隔从先前的值到最大值都呈指数级增长,但是如果性能出现正常,则时间间隔被重置为最小值。 工作的评估是统计学的,以便消除测量中的变化,并且提供目标量的自动校准,以及用于优先考虑多个后台任务的机制。
    • 8. 发明授权
    • Identifying and coalescing identical objects encrypted with different keys
    • 识别和合并使用不同键加密的相同对象
    • US07574598B2
    • 2009-08-11
    • US11150801
    • 2005-06-10
    • John R. DouceurWilliam J. BoloskyMarvin M. Theimer
    • John R. DouceurWilliam J. BoloskyMarvin M. Theimer
    • H04L29/06
    • H04L9/3236H04L9/3247Y10S707/99953Y10S707/99955
    • Cryptographic protocols and methods of employing the same are described. The described protocols advantageously enable two or more identical encryptable objects that are coded for encryption with different keys to be identified as identical without access to either the unencrypted objects or the keys that are used in the encryption process. Additionally, the protocols enable two or more identical encryptable objects to be processed with different encryption keys, yet be stored in a manner so that the total required storage space is proportional to the space that is required to store a single encryptable object, plus a constant amount for each distinct encryption key. In various embodiments, the encryptable objects comprise files and the cryptographic protocols enable encrypted files to be used in connection with single instance store (SIS) systems.
    • 描述了使用它们的密码协议和方法。 所描述的协议有利地使得被编码用于具有不同密钥的加密的两个或更多个相同的可加密对象被识别为相同,而不访问加密过程中使用的未加密对象或密钥。 另外,这些协议允许使用不同的加密密钥来处理两个或多个相同的可加密对象,但是以一定的方式存储,使得所需的总存储空间与存储单个可加密对象所需的空间成正比,加上常数 每个不同加密密钥的数量。 在各种实施例中,可加密对象包括文件,并且加密协议使加密文件能够与单实例存储(SIS)系统相关联使用。