会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Trusted application migration across computer nodes
    • 跨计算机节点的可信应用程序迁移
    • US09210148B2
    • 2015-12-08
    • US13995511
    • 2011-12-30
    • Mallik BulusuRobert BahnsenVincent J. ZimmerRobert S. GittinsRobert C. Swanson
    • Mallik BulusuRobert BahnsenVincent J. ZimmerRobert S. GittinsRobert C. Swanson
    • H04L29/06G06F21/00
    • H04L63/0876G06F21/00H04L63/08H04W12/06H04W12/08
    • An embodiment includes a secure and stable method for sending information across a compute continuum. For example, the method may include executing an application (e.g., video player) on a first node (e.g., tablet) with a desire to perform “context migration” to a second node (e.g., desktop). This may allow a user to watch a movie on the tablet, stop watching the movie, and then resume watching the movie from the desktop. To do so in a secure and stable manner, the first node may request security and performance credentials from the second node. If both credential sets satisfy thresholds, the first node may transfer content (e.g., encrypted copy of a movie) and state information (e.g., placeholder indicating where the movie was when context transfer began). The second node may then allow the user to resume his or her movie watching from the desktop. Other embodiments are described herein.
    • 一个实施例包括用于在计算连续体上发送信息的安全且稳定的方法。 例如,该方法可以包括在第一节点(例如,平板电脑)上执行应用(例如,视频播放器),期望执行到第二节点(例如桌面)的“上下文迁移”。 这可能允许用户在平板电脑上观看电影,停止观看电影,然后从桌面恢复观看电影。 为了以安全和稳定的方式这样做,第一节点可以从第二节点请求安全性和性能凭证。 如果两个凭证组都满足阈值,则第一节点可以传送内容(例如,电影的加密副本)和状态信息(例如,当上下文传送开始时,指示电影在哪里的占位符)。 然后,第二节点可以允许用户从桌面恢复他或她的电影观看。 本文描述了其它实施例。
    • 2. 发明申请
    • TRUSTED APPLICATION MIGRATION ACROSS COMPUTER NODES
    • 涉嫌计算机应用程序迁移
    • US20130318577A1
    • 2013-11-28
    • US13995511
    • 2011-12-30
    • Mallik BulusuRobert BahnsenVincent J. ZimmerRobert S. GittinsRobert C. Swanson
    • Mallik BulusuRobert BahnsenVincent J. ZimmerRobert S. GittinsRobert C. Swanson
    • H04L29/06
    • H04L63/0876G06F21/00H04L63/08H04W12/06H04W12/08
    • An embodiment includes a secure and stable method for sending information across a compute continuum. For example, the method may include executing an application (e.g., video player) on a first node (e.g., tablet) with a desire to perform “context migration” to a second node (e.g., desktop). This may allow a user to watch a movie on the tablet, stop watching the movie, and then resume watching the movie from the desktop. To do so in a secure and stable manner, the first node may request security and performance credentials from the second node. If both credential sets satisfy thresholds, the first node may transfer content (e.g., encrypted copy of a movie) and state information (e.g., placeholder indicating where the movie was when context transfer began). The second node may then allow the user to resume his or her movie watching from the desktop. Other embodiments are described herein.
    • 一个实施例包括用于在计算连续体上发送信息的安全且稳定的方法。 例如,该方法可以包括在第一节点(例如,平板电脑)上执行应用(例如,视频播放器),期望执行到第二节点(例如桌面)的“上下文迁移”。 这可能允许用户在平板电脑上观看电影,停止观看电影,然后从桌面恢复观看电影。 为了以安全和稳定的方式这样做,第一节点可以从第二节点请求安全性和性能证书。 如果两个凭证组都满足阈值,则第一节点可以传送内容(例如,电影的加密副本)和状态信息(例如,当上下文传送开始时,指示电影在哪里的占位符)。 然后,第二节点可以允许用户从桌面恢复他或她的电影观看。 本文描述了其它实施例。
    • 9. 发明授权
    • Event logging and analysis in a software system
    • 软件系统中的事件记录和分析
    • US07546488B2
    • 2009-06-09
    • US10884312
    • 2004-07-02
    • Michael D. WalkerRobert S. GittinsRobert C. Swindler, Jr.
    • Michael D. WalkerRobert S. GittinsRobert C. Swindler, Jr.
    • G06F11/00
    • G06F11/3476
    • Method and apparatus for logging and analyzing event flows associated with execution of a service request in a software system, such as a computer-based system comprising a multi-disc data storage array. Execution of the service request results in a plurality of events carried out by multiple layers of the software system. A global event log accumulates a corresponding plurality of entries which associates each of the events carried out by the multiple layers. An event trace facility preferably accesses the global event log to provide a sequence of the entries corresponding to the service request, such as in a tree structure or time sequence order displayed by a graphical user interface. A log manager preferably controls operation of the global event log. Entries in the global event log are preferably entered sequentially for each ongoing process, and each entry preferably includes an identifier that identifies the associated service request.
    • 用于记录和分析与在软件系统中执行服务请求相关联的事件流的方法和装置,诸如包括多盘数据存储阵列的基于计算机的系统。 服务请求的执行导致由软件系统的多个层执行的多个事件。 全局事件日志累积相应的多个条目,其关联由多个层执行的每个事件。 事件跟踪设施优选地访问全局事件日志以提供与服务请求相对应的条目的序列,诸如由图形用户界面显示的树结构或时间顺序顺序。 日志管理器优选地控制全局事件日志的操作。 对于每个正在进行的处理,优选顺序地输入全局事件日志中的条目,并且每个条目优选地包括标识相关联的服务请求的标识符。