会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Associating partitions in a computing device
    • 在计算设备中关联分区
    • US08583891B1
    • 2013-11-12
    • US13189783
    • 2011-07-25
    • Randall R. SpanglerWilliam A. DrewryWilliam F. Richardson
    • Randall R. SpanglerWilliam A. DrewryWilliam F. Richardson
    • G06F12/02
    • G06F9/4406
    • Methods and apparatus for associating partitions in a computing device are disclosed. An example method includes, loading an operating system (O/S) kernel partition (kernel partition) and identifying one or more root filesystem (rootfs) partitions that are compatible with the loaded kernel partition. In the example method, the one or more compatible rootfs partitions are identified by comparing a set of compatibility bits of the loaded kernel partition with respective sets of compatibility bits of a plurality of rootfs partitions of the computing device. The example method still further includes selecting a rootfs partition from the one or more identified compatible rootfs partitions and loading the selected rootfs partition.
    • 公开了用于在计算设备中关联分区的方法和装置。 一个示例方法包括:加载操作系统(O / S)内核分区(内核分区)并识别与加载的内核分区兼容的一个或多个根文件系统(rootfs)分区。 在示例性方法中,通过将加载的内核分区的一组兼容性比特与计算设备的多个rootfs分区的相应的相应组的集合进行比较来识别一个或多个兼容的rootfs分区。 该示例方法还包括从一个或多个所识别的兼容的rootfs分区中选择一个rootfs分区并加载所选的rootfs分区。
    • 3. 发明授权
    • Verified boot path retry
    • 验证的引导路径重试
    • US08832455B1
    • 2014-09-09
    • US13239303
    • 2011-09-21
    • William A. DrewryWilliam F. RichardsonRandall R. Spangler
    • William A. DrewryWilliam F. RichardsonRandall R. Spangler
    • G06F21/00
    • G06F21/575
    • Configurations providing a non-zero threshold for verifying a root file system of an operating system stored on blocks of a boot storage are disclosed. In particular, the root file system is verified during a boot sequence for the operating system. For each block of the root file system of the boot storage, the subject technology verifies a respective block of the boot storage. A counter tracking a number of verification failures is incremented if the block fails verification. In some configurations, the subject technology determines whether the counter meets a predetermined non-zero threshold. If the counter meets the predetermined non-zero threshold, the root file system is marked as corrupted. A recovery mode for the operating system is then initiated. If the counter does not meet the predetermined non-zero threshold, the operating system is reset in order to verify the root file system during a subsequent boot sequence.
    • 公开了提供用于验证存储在引导存储器的块上的操作系统的根文件系统的非零阈值的配置。 特别地,根文件系统在操作系统的引导顺序期间被验证。 对于引导存储器的根文件系统的每个块,主题技术验证引导存储器的相应块。 跟踪多个验证失败的计数器如果块验证失败,则会递增。 在一些配置中,主题技术确定计数器是否满足预定的非零阈值。 如果计数器满足预定的非零阈值,则根文件系统被标记为已损坏。 然后启动操作系统的恢复模式。 如果计数器不满足预定的非零阈值,则操作系统被重置以便在随后的引导序列期间验证根文件系统。
    • 4. 发明授权
    • System and method for updating a locally stored recovery image
    • 用于更新本地存储的恢复映像的系统和方法
    • US08819330B1
    • 2014-08-26
    • US13237873
    • 2011-09-20
    • Randall R. SpanglerWilliam A. DrewryWilliam F. Richardson
    • Randall R. SpanglerWilliam A. DrewryWilliam F. Richardson
    • G06F12/00
    • G06F12/1425G06F11/1417G06F11/1433
    • Systems, methods, and machine-readable media for storing a recovery image on a secondary memory device on a computing system and updating the recovery image. In some aspects, the system may include a main storage device comprising an operating system, a secondary storage device, internal to the computer system and separate from the main storage device, comprising a recovery image, and a processor configured to determine whether to boot the computer system in a normal mode using the main storage device or in a recovery mode using the recovery image on the secondary storage device. In some aspects, the system may also include a recovery circuit configured to prevent access to the secondary storage device during the normal mode when the recovery circuit is disabled and to permit access to the second storage device when the recovery circuit is enabled during the recovery mode process.
    • 用于将恢复映像存储在计算系统上的次存储器设备上并更新恢复映像的系统,方法和机器可读介质。 在一些方面,系统可以包括主存储设备,其包括操作系统,辅助存储设备,计算机系统内部并且与主存储设备分离,包括恢复映像,以及处理器,被配置为确定是否引导 计算机系统以正常模式使用主存储设备,或者在恢复模式下使用辅助存储设备上的恢复映像。 在一些方面,系统还可以包括恢复电路,其被配置为当恢复电路被禁用时在正常模式期间防止对辅助存储设备的访问,并且当在恢复模式期间启用恢复电路时允许访问第二存储设备 处理。
    • 7. 发明授权
    • Configuring policy settings on client computing devices
    • 在客户端计算设备上配置策略设置
    • US08701157B1
    • 2014-04-15
    • US13348574
    • 2012-01-11
    • Glenn WilsonSumit GwalaniWilliam A. DrewryMattias Stefan Nissler
    • Glenn WilsonSumit GwalaniWilliam A. DrewryMattias Stefan Nissler
    • H04L29/06
    • H04L63/20H04L63/08H04L63/0823H04L67/306H04L67/34
    • Systems and methods for configuring policy settings on client computing devices are provided. In some aspects, a method includes transmitting login credentials to one or more server machines. The method also includes receiving, on the client computing device, policy data and a public key from the one or more server machines in response to the login credentials. The method also includes authenticating the policy data based on the public key. The method also includes automatically installing policy settings based on the authenticated policy data on the client computing device. The policy settings identified by the policy data include four or more of: compliance settings, behavioral settings, software applications, permission to access one or more websites, restrictions on accessing one or more websites, read permission in a remote document storage unit, or write permission in a remote document storage unit.
    • 提供了在客户端计算设备上配置策略设置的系统和方法。 在一些方面,一种方法包括将登录凭证传送到一个或多个服务器机器。 该方法还包括响应于登录凭证在客户端计算设备上接收来自一个或多个服务器机器的策略数据和公钥。 该方法还包括基于公钥验证策略数据。 该方法还包括基于客户端计算设备上的认证策略数据自动安装策略设置。 由策略数据确定的策略设置包括以下四个或更多:合规性设置,行为设置,软件应用程序,访问一个或多个网站的权限,访问一个或多个网站的限制,远程文档存储单元中的读取权限或写入 远程文档存储单元的权限。
    • 10. 发明授权
    • Allowing a client computing device to securely interact with a private network
    • 允许客户端计算设备安全地与专用网络交互
    • US09015824B1
    • 2015-04-21
    • US13405167
    • 2012-02-24
    • William A. DrewryKenneth Edward Mixter
    • William A. DrewryKenneth Edward Mixter
    • H04L29/00H04L9/32G06F11/30
    • H04L9/32G06F21/6218
    • Systems and methods for allowing client computing device to securely interact with private network are provided. Method includes initiating virtual private network connection. Method also includes executing at least portion of virtual private network client code within memory region for unsecure software. Method also includes receiving request within virtual private network client code to access local resource. Local resource is within memory region for secure software. Method also includes determining whether virtual private network client code has permission to access local resource within memory region for secure software. Method also includes, if virtual private network client code has permission to access local resource, providing local resource to virtual private network client code according to request within virtual private network client code. Method also includes, if virtual private network lacks permission to access the local resource, denying local resource to virtual private network client code.
    • 提供了允许客户端计算设备安全地与专用网络交互的系统和方法。 方法包括启动虚拟专用网络连接。 方法还包括在非安全软件的内存区内执行虚拟专用网客户端代码的至少一部分。 方法还包括在虚拟专用网络客户端代码中接收访问本地资源的请求。 本地资源在安全软件的内存区域内。 方法还包括确定虚拟专用网络客户端代码是否具有访问用于安全软件的存储器区域内的本地资源的许可。 方法还包括,如果虚拟专用网客户端代码具有访问本地资源的权限,则根据虚拟专用网客户端代码内的请求向虚拟专用网客户端代码提供本地资源。 方法还包括,如果虚拟专用网络缺少访问本地资源的权限,则拒绝虚拟专用网客户端代码的本地资源。