会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Protection agents and privilege modes
    • 保护代理和特权模式
    • US08380987B2
    • 2013-02-19
    • US11627320
    • 2007-01-25
    • Eric TrautForrest FoltzAndrew ThorntonSuyash Sinha
    • Eric TrautForrest FoltzAndrew ThorntonSuyash Sinha
    • G06F21/00
    • G06F12/1491G06F9/45533G06F21/554
    • This document describes tools capable of making a portion of operating-system memory associated with a protection agent unalterable or inaccessible from an operating-system privilege mode. In some embodiments, these tools are capable of creating a protection-agent privilege mode by requesting that a virtual machine monitor protect this portion of operating-system memory. In other embodiments, these tools are capable of creating the protection-agent privilege mode by virtualizing a physical processor into multiple virtual processors, at least one of which is a protection-agent virtual processor designed to run the protection agent. By making this portion of operating-system memory unalterable or inaccessible from the operating-system privilege mode, the protection agent may be less vulnerable to attacks by entities operating within the operating-system privilege mode.
    • 本文档描述了能够使与操作系统特权模式不可更改或不可访问的保护代理相关联的操作系统内存的一部分的工具。 在一些实施例中,这些工具能够通过请求虚拟机监视器保护操作系统存储器的这一部分来创建保护代理特权模式。 在其他实施例中,这些工具能够通过将物理处理器虚拟化为多个虚拟处理器来创建保护代理特权模式,其中至少一个虚拟处理器是被设计为运行保护代理的保护代理虚拟处理器。 通过使操作系统内存的这一部分从操作系统特权模式变得不可改变或不可访问,保护代理可能不太容易受到在操作系统特权模式下操作的实体的攻击。
    • 4. 发明申请
    • Protection Agents and Privilege Modes
    • 保护代理和特权模式
    • US20080184373A1
    • 2008-07-31
    • US11627320
    • 2007-01-25
    • Eric TrautForrest C. FoltzAndrew ThorntonSuyash Sinha
    • Eric TrautForrest C. FoltzAndrew ThorntonSuyash Sinha
    • H04L9/00G06F12/00
    • G06F12/1491G06F9/45533G06F21/554
    • This document describes tools capable of making a portion of operating-system memory associated with a protection agent unalterable or inaccessible from an operating-system privilege mode. In some embodiments, these tools are capable of creating a protection-agent privilege mode by requesting that a virtual machine monitor protect this portion of operating-system memory. In other embodiments, these tools are capable of creating the protection-agent privilege mode by virtualizing a physical processor into multiple virtual processors, at least one of which is a protection-agent virtual processor designed to run the protection agent. By making this portion of operating-system memory unalterable or inaccessible from the operating-system privilege mode, the protection agent may be less vulnerable to attacks by entities operating within the operating-system privilege mode.
    • 本文档描述了能够使与操作系统特权模式不可更改或不可访问的保护代理相关联的操作系统内存的一部分的工具。 在一些实施例中,这些工具能够通过请求虚拟机监视器保护操作系统存储器的这一部分来创建保护代理特权模式。 在其他实施例中,这些工具能够通过将物理处理器虚拟化为多个虚拟处理器来创建保护代理特权模式,其中至少一个虚拟处理器是被设计为运行保护代理的保护代理虚拟处理器。 通过使操作系统内存的这一部分从操作系统特权模式变得不可改变或不可访问,保护代理可能不太容易受到在操作系统特权模式下操作的实体的攻击。
    • 7. 发明申请
    • ASYNCHRONOUS ONLINE SEARCHES
    • 不寻常的在线搜索
    • US20120131037A1
    • 2012-05-24
    • US12949772
    • 2010-11-18
    • Suyash Sinha
    • Suyash Sinha
    • G06F17/30
    • G06F16/957
    • The claimed subject matter provides a method for generating asynchronous search results. The method includes receiving an asynchronous search request from a browser. The method also includes requesting asynchronous results from an asynchronous query system. Additionally, the method includes performing a synchronous search based on the asynchronous search request. The synchronous search generates initial results. The method further includes providing the initial results to the browser. Also, the method includes providing, to the browser, an estimated completion time when the asynchronous results are made available.
    • 所要求保护的主题提供了一种用于产生异步搜索结果的方法。 该方法包括从浏览器接收异步搜索请求。 该方法还包括从异步查询系统请求异步结果。 另外,该方法包括基于异步搜索请求执行同步搜索。 同步搜索生成初始结果。 该方法还包括向浏览器提供初始结果。 此外,该方法包括在异步结果可用时向浏览器提供估计的完成时间。
    • 8. 发明申请
    • APPLICATION SLA BASED DYNAMIC, ELASTIC, AND ADAPTIVE PROVISIONING OF NETWORK CAPACITY
    • 基于SLA的动态,弹性和自适应提供网络容量
    • US20110258317A1
    • 2011-10-20
    • US12762372
    • 2010-04-19
    • Suyash SinhaSreenivas Addagatla
    • Suyash SinhaSreenivas Addagatla
    • G06F15/173
    • H04L41/5006H04L41/12
    • A network resource management (NRM) system is described for allocating portions of available network capacity to applications, where the available network capacity is treated as a pool of virtual network resources. The NRM system operates by receiving a service level agreement (SLA) that specifies network resources that are requested by an application. The NRM system also receives network topology information regarding features of a physical communication network, which define, in turn, the available network capacity. Based on these inputs, the NRM system allocates a portion of the available network capacity to the application, to produce an SLA assignment. The NRM system then monitors events that may affect the SLA assignment. If such an event is detected, the NRM system can modify the SLA assignment, e.g., by changing or releasing the network resources assigned to the application, etc.
    • 描述了网络资源管理(NRM)系统,用于将可用网络容量的部分分配给应用,其中可用网络容量被视为虚拟网络资源池。 NRM系统通过接收指定应用请求的网络资源的服务级别协议(SLA)来操作。 NRM系统还接收关于物理通信网络的特征的网络拓扑信息,这又定义了可用的网络容量。 基于这些输入,NRM系统将可用网络容量的一部分分配给应用,以产生SLA分配。 然后,NRM系统监视可能影响SLA分配的事件。 如果检测到这样的事件,则NRM系统可以修改SLA分配,例如通过改变或释放分配给应用的网络资源等。
    • 9. 发明授权
    • Method for secure on-line voting
    • 安全在线投票的方法
    • US07055742B2
    • 2006-06-06
    • US10879405
    • 2004-06-29
    • Suyash Sinha
    • Suyash Sinha
    • G06C13/00G06K17/00
    • G07C13/00
    • A voting application on a computing device of a voter sends a challenge including data identifying and verifying the voter, the challenge is validated to ensure that the identified voter allowed to vote, and a response is sent with a vote identification value identifying the voter as being activated. A ballot is then sent to the voting application and presented thereby to the voter based on which voting information is gathered from the voter. The voting application then sends a vote package with the vote identification value and the gathered voting information, and the vote package is validated to ensure that the vote identification value matches the vote identification value matches. The voting information from the vote package is then tallied.
    • 投票人的计算设备上的投票式应用程序发出挑战,包括识别和验证选民的数据,确认挑战是为了确保所选投票人被允许投票,并以响应的方式将投票人的投票身份识别值标识为 活性。 然后将投票发送到投票申请书,并将其提交给选民,根据投票人从哪个投票信息收集。 投票申请书随后以投票的识别价值和所收集的投票信息发送投票包,并对投票包进行验证,以确保投票确认价值与投票识别值匹配。 然后计算投票包中的投票信息。