会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • TOLERATING AND DETECTING ASYMMETRIC RACES
    • 加速和检测不对称赛车
    • US20090049545A1
    • 2009-02-19
    • US11839017
    • 2007-08-15
    • Rahul NagpalDarko KirovskiBenjamin G. Zorn
    • Rahul NagpalDarko KirovskiBenjamin G. Zorn
    • G06F11/00
    • G06F9/526
    • Detecting and/or tolerating races. Races occur due to malicious threads not respecting software locks. A method of detecting and/or correcting races includes making local copie(s) and reference copie(s) of shared data. Any read and write operations performed by a safe thread are caused to be performed on the local copie(s) during a critical section. The critical section defines a time frame which a variable lock is placed on shared data. Any read and write operations performed by malicious threads are allowed to be performed on the shared data during the critical section. The shared data, the local copie(s), and the reference copie(s) are compared to determine that a race has been detected. An indication can be output that a race has occurred or the race can be corrected.
    • 检测和/或容忍种族。 由于不遵守软件锁的恶意线程而发生竞赛。 检测和/或校正种族的方法包括制作共享数据的本地复本和参考文件。 在安全线程执行的任何读写操作都会导致在临界区域对本地复合机执行。 关键部分定义了将变量锁定在共享数据上的时间范围。 允许在关键部分对共享数据执行由恶意线程执行的任何读写操作。 比较共享数据,本地复本和参考文件,以确定已经检测到比赛。 可以输出发生比赛的指示或者可以纠正比赛。
    • 2. 发明授权
    • Tolerating and detecting asymmetric races
    • 容忍和检测非对称种族
    • US07971248B2
    • 2011-06-28
    • US11839017
    • 2007-08-15
    • Rahul NagpalDarko KirovskiBenjamin G. Zorn
    • Rahul NagpalDarko KirovskiBenjamin G. Zorn
    • G06F11/00
    • G06F9/526
    • Detecting and/or tolerating races. Races occur due to malicious threads not respecting software locks. A method of detecting and/or correcting races includes making local copie(s) and reference copie(s) of shared data. Any read and write operations performed by a safe thread are caused to be performed on the local copie(s) during a critical section. The critical section defines a time frame which a variable lock is placed on shared data. Any read and write operations performed by malicious threads are allowed to be performed on the shared data during the critical section. The shared data, the local copie(s), and the reference copie(s) are compared to determine that a race has been detected. An indication can be output that a race has occurred or the race can be corrected.
    • 检测和/或容忍种族。 由于不遵守软件锁的恶意线程而发生竞赛。 检测和/或校正种族的方法包括制作共享数据的本地复本和参考文件。 在安全线程执行的任何读写操作都会导致在临界区域对本地复合机执行。 关键部分定义了将变量锁定在共享数据上的时间范围。 允许在关键部分对共享数据执行由恶意线程执行的任何读写操作。 比较共享数据,本地复本和参考文件,以确定已经检测到比赛。 可以输出发生比赛的指示或者可以纠正比赛。
    • 5. 发明授权
    • Radio frequency certificates of authenticity and related scanners
    • 射频证书的真实性和相关的扫描仪
    • US08708241B2
    • 2014-04-29
    • US12633289
    • 2009-12-08
    • Gerald R DeJeanDarko Kirovski
    • Gerald R DeJeanDarko Kirovski
    • G06K19/06
    • H01Q9/0421H01Q1/243H01Q1/38H01Q19/005
    • Radio frequency certificates of authenticity (RFCOAs) and associated scanners and methods are presented. In one implementation, an array of miniaturized antenna elements in an RFCOA scanner occupies an area smaller than a credit card yet obtains a unique electromagnetic fingerprint from an RFCOA associated with an item, such as the credit card. The antenna elements are miniaturized by a combination of both folding and meandering the antenna patch components. The electromagnetic fingerprint of an exemplary RFCOA embeddable in a credit card or other item is computationally infeasible to fake, and the RFCOA cannot be physically copied or counterfeited based only on possession of the electromagnetic fingerprint.
    • 介绍了射频证书的真实性(RFCOAs)及相关的扫描仪和方法。 在一个实现中,RFCOA扫描器中的小型化天线元件阵列占据小于信用卡的区域,而从与诸如信用卡的项目相关联的RFCOA获得唯一的电磁指纹。 天线元件通过折叠和曲折天线补片部件的组合而被小型化。 可嵌入信用卡或其他物品中的示例性RFCOA的电磁指纹在计算上是不可行的,并且RFCOA不能仅基于拥有电磁指纹而被物理地复制或伪造。
    • 7. 发明授权
    • Reputation in on-line consumer markets
    • 在线消费市场的声誉
    • US08438068B2
    • 2013-05-07
    • US11952679
    • 2007-12-07
    • Darko KirovskiAshwin SwaminathanRenan Gonçalves CattelanVarkey Cherian
    • Darko KirovskiAshwin SwaminathanRenan Gonçalves CattelanVarkey Cherian
    • G06Q30/00
    • G06Q30/06G06Q20/10G06Q30/02G06Q50/188
    • Seller's reputation quantification technique embodiments are presented that quantify in monetary terms a risk of dissatisfaction to a potential buyer of a product or service from a seller in an on-line consumer market. Generally, this involves computing the monetary sales limit for the seller. This monetary sales limit represents an amount, which if a sum of the current prices of all the products and services currently offered by the seller is equal to or less than the amount, there would not be a significant risk to the buyer of being dissatisfied with the product or service. Given this, a risk of a potential buyer's dissatisfaction with a product or service purchased from the seller in view of a price the buyer wants to pay is assessed. The assessed risk is then provided to the potential buyer in the form of one or more risk indicators.
    • 提供卖方信誉量化技术实施方案,以货币方式量化在在线消费者市场上卖方对产品或服务的潜在买家的不满意的风险。 一般来说,这涉及计算卖方的货币销售限额。 该货币销售限额是指一笔金额,如果卖方目前提供的所有产品和服务的当前价格的总和等于或小于该金额,买方就不会有不满意的风险 产品或服务。 鉴于此,鉴于买方要支付的价格,潜在买家对从卖方购买的产品或服务的不满风险被评估。 然后以一种或多种风险指标的形式向潜在买方提供评估风险。
    • 10. 发明授权
    • Watchdog processors in multicore systems
    • 多核系统中的看门狗处理器
    • US07958396B2
    • 2011-06-07
    • US11437341
    • 2006-05-19
    • Behrooz ChitsazDarko Kirovski
    • Behrooz ChitsazDarko Kirovski
    • G06F11/00G06F11/30
    • G06F11/349G06F11/0724G06F11/0757G06F21/606G06F2221/2101
    • Systems and methods are provided for securing a multicore computer chip with a watchdog processor. In a system with a watchdog process and any number of other processors and components, the watchdog processor monitors bus communications between the second processor and at least one third component. The watchdog processor may be further independently coupled to at least one of the other components so that it can monitor internal operations of such component, thereby acquiring detailed information about the specific operations of at least one component in the system. The watchdog processor can enforce an interaction policy on bus communications between components, as well as enforce an independent security policy on the monitored components.
    • 提供了系统和方法,用于通过看门狗处理器来保护多核计算机芯片。 在具有看门狗进程和任何数量的其他处理器和组件的系统中,看门狗处理器监视第二处理器与至少一个第三组件之间的总线通信。 看门狗处理器可以进一步独立地耦合到至少一个其他组件,使得其可以监视这种组件的内部操作,从而获取关于系统中至少一个组件的具体操作的详细信息。 看门狗处理器可以在组件之间的总线通信上实施交互策略,并对监视的组件实施独立的安全策略。