会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • LOCK WAIT TIME REDUCTION IN A DISTRIBUTED PROCESSING ENVIRONMENT
    • 分布式处理环境中的锁定等待时间减少
    • US20130013833A1
    • 2013-01-10
    • US13178639
    • 2011-07-08
    • Abhinay Ravinder NagpalSri RamanathanSandeep Ramesh PatilMatthew Bunkley Trevathan
    • Abhinay Ravinder NagpalSri RamanathanSandeep Ramesh PatilMatthew Bunkley Trevathan
    • G06F13/14
    • G06F9/524G06F2209/522
    • Aspects of the present invention reduce a lock wait time in a distributed processing environment. A plurality of wait-for dependencies between a first plurality of transactions and a second plurality of transactions in a distributed processing environment is identified. The first plurality of transactions waits for the second plurality of transactions to release a plurality of locks on a plurality of shared resources. An amount of time the first plurality of transactions will wait for the second plurality of transactions in the distributed processing environment is determined based on the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions. Historical transaction data related to the plurality of wait-for dependencies between the first plurality of transactions and the second plurality of transactions is analyzed. The amount of time the first plurality of transactions will wait for the second plurality of transactions is reduced based on the historical transaction data.
    • 本发明的方面减少了分布式处理环境中的锁定等待时间。 识别在分布式处理环境中的第一多个事务和第二多个事务之间的多个等待依赖关系。 第一多个事务等待第二多个事务在多个共享资源上释放多个锁。 基于第一多个事务和第二个多个事务之间的多个等待依赖关系来确定第一多个事务将在分布式处理环境中等待第二多个事务的时间量。 分析与第一多个事务和第二个多个事务之间的多个等待依赖关系相关的历史事务数据。 基于历史交易数据,第一多个交易将等待第二个多个交易的时间量减少。
    • 7. 发明申请
    • TUNABLE ENCRYPTION SYSTEM
    • 可控加密系统
    • US20100095127A1
    • 2010-04-15
    • US12248982
    • 2008-10-10
    • Dwip N. BanerjeeSandeep Ramesh PatilSachin C. PunadikarRavi A. Shankar
    • Dwip N. BanerjeeSandeep Ramesh PatilSachin C. PunadikarRavi A. Shankar
    • H04L9/32
    • H04L63/0428H04L63/0807H04L63/105
    • A method, programmed medium and system are provided for enabling a user to choose a user-preferred encryption type from among a plurality of encryption types listed in a user's Kerberos configuration file. During the ticket granting process in a Kerberos system, a user is requested to select a preferred encryption type to be used in the Kerberos communication from among encryption types contained in the user's Kerberos configuration file. The user-selected encryption type is then implemented for use in encrypting a session ticket (as well as generating the session key of user requested encryption type) for use by the user machine in communicating securely with an Kerberized application server when being communicated by that particular user. Thus, the system allows different users to simultaneously communicate with the same Kerberized application server using a supported encryption type of the user's own choice.
    • 提供了一种方法,编程介质和系统,用于使用户能够从用户的Kerberos配置文件中列出的多种加密类型中选择用户优选的加密类型。 在Kerberos系统中的故障单授予过程中,请求用户从用户的Kerberos配置文件中包含的加密类型中选择要在Kerberos通信中使用的首选加密类型。 用户选择的加密类型然后被实现用于加密会话票据(以及生成用户请求的加密类型的会话密钥),以供用户机器在被特定的通信时与Kerberized应用服务器进行安全通信时使用 用户。 因此,系统允许不同的用户使用用户自己选择的受支持的加密类型同时与相同的Kerberized应用服务器进行通信。
    • 8. 发明授权
    • Security compliant data storage management
    • 安全兼容的数据存储管理
    • US08590050B2
    • 2013-11-19
    • US13105283
    • 2011-05-11
    • Abhinay Ravinder NagpalSri RamanathanSandeep Ramesh PatilMatthew Bunkley Trevathan
    • Abhinay Ravinder NagpalSri RamanathanSandeep Ramesh PatilMatthew Bunkley Trevathan
    • H04L9/00
    • G06F21/6218
    • An embodiment of the invention is a program for dynamically managing files to comply with security requirements. In one embodiment, changing security requirements require that the computer system identifies the current storage locations of files along with the files' respective security levels. Files containing changed security levels due to the changed security requirements are relocated to storage locations clustered with storage locations containing files of the same security level. In another embodiment, the computer system receives a file having a certain security level, identifies current storage locations of files with the files' respective security levels, and finally allocates the new file to a storage location clustered with storage locations containing files of the same security level.
    • 本发明的实施例是用于动态管理文件以符合安全要求的程序。 在一个实施例中,改变安全性要求要求计算机系统与文件的相应安全级别一起识别文件的当前存储位置。 由于更改的安全性要求而将包含更改的安全级别的文件重新定位到与包含相同安全级别的文件的存储位置聚集的存储位置。 在另一个实施例中,计算机系统接收具有特定安全级别的文件,用文件相应的安全级别识别文件的当前存储位置,并且最终将新文件分配到与包含相同安全性的文件的存储位置聚集的存储位置 水平。