会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • High density ROM in separate isolation well on single with chip
    • 高密度ROM单独隔离,单芯片
    • US4680698A
    • 1987-07-14
    • US552601
    • 1983-11-16
    • Jonathan EdwardsDavid L. WallerMichael D. May
    • Jonathan EdwardsDavid L. WallerMichael D. May
    • G06F9/30G06F9/318G06F9/34G06F9/355G06F9/46G06F9/48G06F9/52G06F15/78G06F15/80G11C29/00H01L21/761H01L21/822H01L27/04G06F13/00G06F7/48G06F15/16H01L27/02
    • G06F9/4881G06F15/786G06F15/8023G06F9/30167G06F9/30192G06F9/54G11C29/70
    • A programmable, high speed, single chip microcomputer includes 4K of RAM, ROM, registers and an ALU. Program can be stored in the on-chip RAM. The first local variable of each process to be executed is a workspace pointer (WPTR), and each process has a respective workspace identified by its WPTR. For each process, addressing of other variables is relative to the current WPTR, which is stored in a workpiece pointer register (WPTR REG). Instructions are constant bit size, having a function portion and a data portion loaded, respectively, into an instruction buffer (IB) and an operand register (OREGTR). Memory address locations are formed by combining the contents of the workspace pointer register and the operand register, or the contents of the A Register and the operand register. A set of "direct functions" obtains data from OREG. "Indirect functions" use the OREG contents to identify other functions, obtaining data from registers other than the operand register. A "prefixing" function (PFIX) develops operands having long bit lengths. Scheduling and descheduling of processes are achieved by forming a linked list within the several workspaces for the active processes. Each workspace identifies the workspace pointer of the next process to be executed. Each workspace contains in memory the identification of the next instruction to be executed for that respective process. A "last pointer" register (LPTR REG.) cooperates in the scheduling operations. Each microcomputer chip can be coupled serially to other such chips on a respective pair of only two wires, each a unidirectional channel. Each channel also has two registers, one for process identification and one for data. Communications are synchronized.
    • 一个可编程的高速单片机包括4K的RAM,ROM,寄存器和ALU。 程序可以存储在片内RAM中。 要执行的每个进程的第一个局部变量是工作区指针(WPTR),每个进程都具有由其WPTR标识的相应工作空间。 对于每个进程,其他变量的寻址是相对于存储在工件指针寄存器(WPTR REG)中的当前WPTR。 指令是恒定位大小,具有分别加载到指令缓冲器(IB)和操作数寄存器(OREGTR)中的功能部分和数据部分。 通过组合工作区指针寄存器和操作数寄存器的内容,或A寄存器和操作数寄存器的内容来形成存储器地址位置。 一组“直接函数”从OREG获取数据。 “间接功能”使用OREG内容识别其他功能,从操作数寄存器以外的寄存器获取数据。 “前缀”功能(PFIX)开发具有长位长度的操作数。 通过在活动过程的几个工作区内形成一个链表来实现进程的调度和调度。 每个工作区标识要执行的下一个进程的工作区指针。 每个工作区在内存中包含要为该进程执行的下一条指令的标识。 “最后指针”寄存器(LPTR REG。)在调度操作中协作。 每个微型计算机芯片可以在相应的一对仅两条导线上串联连接到其它这样的芯片,每个线路都是单向通道。 每个通道还有两个寄存器,一个用于进程标识,另一个用于数据。 通信同步。
    • 7. 发明申请
    • Method and system for delayed write scanning for detecting computer malwares
    • 用于检测计算机恶意软件的延迟写入扫描方法和系统
    • US20060168660A1
    • 2006-07-27
    • US11390388
    • 2006-03-28
    • Jonathan EdwardsShawna Turner
    • Jonathan EdwardsShawna Turner
    • G06F12/14
    • G06F21/562G06F21/568
    • A method, system, and computer program product provides on-access anti-virus scanning of data files, which can be performed without introducing significant performance degradation and provides delayed file write operation scanning upon interception of a file write operation. A method of detecting a malware comprises the steps of intercepting a file access operation of the a process to a file, in response to the intercepting, waiting a time interval between the intercepting and scanning the file for a malware, and scanning the file for the malware, after waiting the time interval, wherein the process is associated with an application program and wherein the file access operation is a file write operation.
    • 一种方法,系统和计算机程序产品提供数据文件的按访问反病毒扫描,可以在不引入显着的性能下降的情况下执行扫描,并在截取文件写入操作时提供延迟的文件写入操作扫描。 一种检测恶意软件的方法包括以下步骤:响应于拦截,等待对于恶意软件的截取和扫描文件之间的时间间隔,以及扫描该文件的文件,对文件进行文件访问操作 在等待所述时间间隔之后,所述过程与应用程序相关联,并且其中所述文件访问操作是文件写入操作。
    • 10. 发明授权
    • Method and system for delayed write scanning for detecting computer malwares
    • 用于检测计算机恶意软件的延迟写入扫描方法和系统
    • US07757361B2
    • 2010-07-20
    • US11390388
    • 2006-03-28
    • Jonathan EdwardsShawna Turner
    • Jonathan EdwardsShawna Turner
    • G06F11/00
    • G06F21/562G06F21/568
    • A method, system, and computer program product provides on-access anti-virus scanning of data files, which can be performed without introducing significant performance degradation and provides delayed file write operation scanning upon interception of a file write operation. A method of detecting a malware comprises the steps of intercepting a file access operation of the a process to a file, in response to the intercepting, waiting a time interval between the intercepting and scanning the file for a malware, and scanning the file for the malware, after waiting the time interval, wherein the process is associated with an application program and wherein the file access operation is a file write operation.
    • 一种方法,系统和计算机程序产品提供数据文件的按访问反病毒扫描,可以在不引入显着的性能下降的情况下执行扫描,并在截取文件写入操作时提供延迟的文件写入操作扫描。 一种检测恶意软件的方法包括以下步骤:响应于拦截,等待对于恶意软件的截取和扫描文件之间的时间间隔,以及扫描该文件的文件,对文件进行文件访问操作 在等待所述时间间隔之后,所述过程与应用程序相关联,并且其中所述文件访问操作是文件写入操作。