会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • Method, system and program product for optimizing java application performance through data mining
    • 通过数据挖掘优化java应用程序性能的方法,系统和程序产品
    • US20060005177A1
    • 2006-01-05
    • US10881968
    • 2004-06-30
    • Steven AtkinMargot CaseyTyron Stading
    • Steven AtkinMargot CaseyTyron Stading
    • G06F9/45
    • G06F8/73G06F8/443
    • Metadata describing common Java classes is extracted and utilized to optimize a Java program's performance based on the code requirements of the application. Data mining techniques extract metadata and other information about different sets of JVM byte code written by multiple vendors to determine the design choices and optimizations made by each vendor in implementing their JVM. Then, byte code in a Java application being programmed is analyzed in comparison to each vendor's JVM metadata and information. Based upon the application's requirements (for example footprint, performance, etc.), recommendations are generated that yield a newly compiled rt.jar that combines the best practices of each vendor together or recommends a particular vendor's standard JVM that is best suited for the application.
    • 提取和使用描述常见Java类的元数据,以根据应用程序的代码要求优化Java程序的性能。 数据挖掘技术提取关于由多个供应商编写的不同JVM字节代码集的元数据和其他信息,以确定每个供应商在实现其JVM时所做的设计选择和优化。 然后,与每个供应商的JVM元数据和信息进行比较,分析正在编程的Java应用程序中的字节码。 根据应用程序的要求(例如,脚印,性能等),会生成一个产生新编译的rt.jar的建议,该rt.jar将每个供应商的最佳实践结合在一起,或者推荐一个最适合应用程序的特定供应商的标准JVM 。
    • 5. 发明申请
    • System and method for securing code and ensuring proper execution using state-based encryption
    • 使用基于状态的加密来保护代码并确保正确执行的系统和方法
    • US20050005103A1
    • 2005-01-06
    • US10460461
    • 2003-06-12
    • Steven AtkinTyron Stading
    • Steven AtkinTyron Stading
    • G06F21/00H04L9/00
    • G06F21/52
    • A system and method for securing code segments and ensuring proper execution using state-based encryption is presented. A class loader captures a memory state snapshot and uses the memory state snapshot for generating a key that encrypts a class. The class loader subsequently captures additional memory state snapshots at specific execution cycle times, and uses the memory state snapshots to generate additional keys that encrypt subsequent code segments. The encrypted code segments are stored in a file that is distributed to client computers. The client computer decrypts the individual code segments using keys that are generated from client memory state snapshots. If a particular code segment is not loaded in order or has been altered, the code segment is not decrypted properly and the software program terminates.
    • 提出了一种用于保护代码段并确保使用状态加密的正确执行的系统和方法。 类加载器捕获内存状态快照,并使用内存状态快照来生成加密类的密钥。 类加载器随后在特定的执行周期中捕获额外的内存状态快照,并使用内存状态快照生成加密后续代码段的其他密钥。 加密的代码段存储在分发给客户端计算机的文件中。 客户端计算机使用从客户端内存状态快照生成的密钥来解密各个代码段。 如果特定的代码段未按顺序加载或已更改,则代码段未被正确解密,并且软件程序终止。
    • 10. 发明申请
    • Method and apparatus for detecting password attacks using modeling techniques
    • 使用建模技术检测密码攻击的方法和装置
    • US20050015614A1
    • 2005-01-20
    • US10621928
    • 2003-07-17
    • Michael GilfixFoluso OkunseindeTyron Stading
    • Michael GilfixFoluso OkunseindeTyron Stading
    • G06F11/30G06F21/00
    • G06F21/31
    • Provided is an apparatus and method for detecting fraudulent passwords so that computer break-in attempts can be distinguished from authorized users incorrectly entering their passwords. An actual password is mapped against a computer keyboard and the resultant data is stored in memory. The profile of an entered password is compared to the stored profile. If the profile of the entered password differs significantly from the stored profile, then the login attempt is flagged as an attempted intrusion. In one embodiment of the current invention, passwords are mapped according to the distance subsequent keystrokes are from each other. Different embodiments may have different mapping schemes. For example, mapping data may correspond to statistical data that corresponds to the likelihood that a particular character is typed by mistake when another character is intended.
    • 提供了一种用于检测欺诈口令的装置和方法,使得计算机入侵尝试可以与授权用户不正确地输入其密码区分开来。 实际的密码与计算机键盘映射,结果数据存储在内存中。 将输入的密码的配置文件与存储的配置文件进行比较。 如果输入的密码的配置文件与存储的配置文件显着不同,则登录尝试将被标记为尝试的入侵。 在本发明的一个实施例中,密码根据随后的击键彼此之间的距离被映射。 不同的实施例可以具有不同的映射方案。 例如,映射数据可以对应于对应于当预期另一个角色时特定字符被错误地键入的可能性的统计数据。