会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method, system, and computer program product for rack position determination using acoustics
    • 使用声学的机架位置确定方法,系统和计算机程序产品
    • US07460978B1
    • 2008-12-02
    • US11770322
    • 2007-06-28
    • Thomas M. BreyRichard E. HarperThomas D. Pahel, Jr.William J. Piazza
    • Thomas M. BreyRichard E. HarperThomas D. Pahel, Jr.William J. Piazza
    • G06F15/00
    • G06F3/002
    • Embodiments of the present invention address deficiencies of the art in respect to equipment position location in a data center and provide a novel and non-obvious method, system and computer program product for rack position determination using acoustics. In one embodiment of the invention, a method for rack position determination using acoustics can be provided. The method can include ultrasonically ranging a first target wall in a data center from a host rack enclosure to acquire range data for the first target wall and ultrasonically ranging a second target wall in the data center from the host rack enclosure to acquire range data for the second target wall. The method further can include translating the range data for the first target wall and second target wall into position coordinates for the host rack enclosure and forwarding the position coordinates to a system administrator for the data center over a coupled data communications network.
    • 本发明的实施例解决了在数据中心中的设备位置位置方面的缺点,并且提供了一种用于使用声学的机架位置确定的新颖且非显而易见的方法,系统和计算机程序产品。 在本发明的一个实施例中,可以提供使用声学的机架位置确定的方法。 该方法可以包括超声波测距数据中心中的第一目标墙,从主机架外壳获取第一目标墙的范围数据,并且从主机架外壳超声波测距数据中心的第二目标墙,以获取范围数据 第二个目标墙。 该方法还可以包括将第一目标壁和第二目标壁的范围数据转换成主机架机架的位置坐标,并且通过耦合的数据通信网络将位置坐标转发给数据中心的系统管理员。
    • 2. 发明授权
    • Specifying associations among attributes of entities in
    • 指定实体属性之间的关联
    • US07921203B2
    • 2011-04-05
    • US11755981
    • 2007-05-31
    • Thomas M. BreyRichard E. HarperWilliam J. Piazza
    • Thomas M. BreyRichard E. HarperWilliam J. Piazza
    • G06F15/173
    • G06F11/30H04L43/0817
    • Specifying associations among attributes of entities in a data center, the data center comprising a facility that houses computers and equipment supporting computer operations, the entities including the computers and the equipment, some attributes associated with a resource domain, the resource domain composed of a physical characteristic shared by some of the computers and equipment, including inducing, by a management module within the data center, a change in a value of a first attribute of a first entity; monitoring, by the management module within the data center, a change in a value of a second attribute of a second entity; determining whether the monitored change in the second attribute correlates with the induced change in the first attribute; and, if the monitored change in the second attribute correlates with the induced change in the first attribute, specifying an association among the first attribute, the second attribute, and the resource domain.
    • 指定数据中心中实体的属性之间的关联,数据中心包括容纳计算机和支持计算机操作的设备的设施,包括计算机和设备的实体,与资源域相关联的一些属性,由物理 一些计算机和设备共享的特征,包括由数据中心内的管理模块引起第一实体的第一属性的值的改变; 由数据中心内的管理模块监视第二实体的第二属性的值的变化; 确定所述第二属性中所监视的改变是否与所述第一属性中所引起的变化相关; 并且如果所监视的第二属性的改变与所述第一属性中的诱导改变相关,则指定所述第一属性,所述第二属性和所述资源域之间的关联。
    • 3. 发明申请
    • Specifying Associations among Attributes of Entities in
    • 指定实体属性之间的关联
    • US20080301279A1
    • 2008-12-04
    • US11755981
    • 2007-05-31
    • Thomas M. BreyRichard E. HarperWilliam J. Piazza
    • Thomas M. BreyRichard E. HarperWilliam J. Piazza
    • G06F15/173
    • G06F11/30H04L43/0817
    • Specifying associations among attributes of entities in a data center, the data center comprising a facility that houses computers and equipment supporting computer operations, the entities including the computers and the equipment, some attributes associated with a resource domain, the resource domain composed of a physical characteristic shared by some of the computers and equipment, including inducing, by a management module within the data center, a change in a value of a first attribute of a first entity; monitoring, by the management module within the data center, a change in a value of a second attribute of a second entity; determining whether the monitored change in the second attribute correlates with the induced change in the first attribute; and, if the monitored change in the second attribute correlates with the induced change in the first attribute, specifying an association among the first attribute, the second attribute, and the resource domain.
    • 指定数据中心中实体的属性之间的关联,数据中心包括容纳计算机和支持计算机操作的设备的设施,包括计算机和设备的实体,与资源域相关联的一些属性,由物理 一些计算机和设备共享的特征,包括由数据中心内的管理模块引起第一实体的第一属性的值的改变; 由数据中心内的管理模块监视第二实体的第二属性的值的变化; 确定所述第二属性中所监视的改变是否与所述第一属性中所引起的变化相关; 并且如果所监视的第二属性的改变与所述第一属性中的诱导改变相关,则指定所述第一属性,所述第二属性和所述资源域之间的关联。
    • 5. 发明申请
    • HEURISTIC MALWARE DETECTION
    • HEURISTIC MALWARE检测
    • US20080141371A1
    • 2008-06-12
    • US11609170
    • 2006-12-11
    • Thomas M. BradicichRichard E. HarperWilliam J. Piazza
    • Thomas M. BradicichRichard E. HarperWilliam J. Piazza
    • G06F11/00
    • G06F21/56G06F21/552
    • Embodiments of the present invention provide a method, system and computer program product for the heuristic malware detection. In one embodiment of the invention, a heuristic malware detection method can include merging a baseline inventory of file attributes for respective files from each client computing system in a community of client computing systems into a merged inventory. The method further can include receiving an updated inventory of file attributes in a current inventory survey from different ones of the client computing systems. Each received survey can be compared to the merged inventory, and in response to the comparison, a deviant pattern of file attribute changes can be detected in at least one survey for a corresponding client computing system. Thereafter, the deviant pattern can be classified as one of a benign event or a malware attack. Finally, malware removal can be requested in the corresponding client computing system if the deviant pattern is classified as a malware attack.
    • 本发明的实施例提供了一种用于启发式恶意软件检测的方法,系统和计算机程序产品。 在本发明的一个实施例中,启发式恶意软件检测方法可以包括将来自客户端计算系统社区中的每个客户端计算系统的相应文件的文件属性的基准库存合并成合并库存。 该方法还可以包括在来自不同的客户端计算系统的当前库存调查中接收文件属性的更新的库存。 每个接收到的调查可以与合并的库存进行比较,并且响应于比较,可以在针对相应的客户端计算系统的至少一个调查中检测到文件属性变化的错误模式。 此后,这种错误的模式可以被归类为良性事件或恶意软件攻击之一。 最后,如果异常模式被分类为恶意软件攻击,则可以在相应的客户端计算系统中请求恶意软件删除。
    • 7. 发明申请
    • Tracking The Physical Location Of A Server In A Data Center
    • 跟踪数据中心服务器的物理位置
    • US20090024764A1
    • 2009-01-22
    • US11779627
    • 2007-07-18
    • Willliam E. AthertonRichard E. HarperWilliam J. Piazza
    • Willliam E. AthertonRichard E. HarperWilliam J. Piazza
    • G06F15/177
    • H04L41/12H04L29/12254H04L61/2038
    • Tracking the physical location of a server in a data center including detecting, through a one-wire link between a connector in a cabinet slot and a management module, insertion of the server into a cabinet slot, the server connected upon insertion to a one-wire link through a connector in the cabinet slot and determining, in dependence upon the one-wire link's multiplexer address code, a physical location of the server. The data center includes a plurality of cabinet slots, each cabinet slot having a connector, the data center also includes a presence-detection network, the presence-detection network comprising one-wire links among the cabinet slots and the management module, the one-wire links coupled between the connectors and the management module and multiplexed into the management module according to multiplexer address codes, each one-wire link associated with a separate multiplexer address code, each multiplexer address code associated with a separate physical location.
    • 跟踪数据中心中的服务器的物理位置,包括通过机柜插槽中的连接器和管理模块之间的单线链路来检测服务器插入机柜插槽中的服务器, 通过机柜插槽中的连接器进行线连接,并根据单线链路的多路复用器地址代码确定服务器的物理位置。 数据中心包括多个机柜插槽,每个机柜插槽均具有连接器,数据中心还包括一个存在检测网络,该存在检测网络包括机柜插槽和管理模块之间的单线链接, 耦合在连接器和管理模块之间的有线链路,并且根据多路复用器地址代码复用到管理模块中,每个单线链路与单独的多路复用器地址码相关联,每个多路复用器地址码与单独的物理位置相关联。
    • 8. 发明授权
    • Heuristic malware detection
    • 启发式恶意软件检测
    • US08091127B2
    • 2012-01-03
    • US11609170
    • 2006-12-11
    • Thomas M. BradicichRichard E. HarperWilliam J. Piazza
    • Thomas M. BradicichRichard E. HarperWilliam J. Piazza
    • G06F11/00
    • G06F21/56G06F21/552
    • Embodiments of the present invention provide a method, system and computer program product for the heuristic malware detection. In one embodiment of the invention, a heuristic malware detection method can include merging a baseline inventory of file attributes for respective files from each client computing system in a community of client computing systems into a merged inventory. The method further can include receiving an updated inventory of file attributes in a current inventory survey from different ones of the client computing systems. Each received survey can be compared to the merged inventory, and in response to the comparison, a deviant pattern of file attribute changes can be detected in at least one survey for a corresponding client computing system. Thereafter, the deviant pattern can be classified as one of a benign event or a malware attack. Finally, malware removal can be requested in the corresponding client computing system if the deviant pattern is classified as a malware attack.
    • 本发明的实施例提供了一种用于启发式恶意软件检测的方法,系统和计算机程序产品。 在本发明的一个实施例中,启发式恶意软件检测方法可以包括将来自客户端计算系统社区中的每个客户端计算系统的相应文件的文件属性的基准库存合并成合并库存。 该方法还可以包括在来自不同的客户端计算系统的当前库存调查中接收文件属性的更新的库存。 每个接收到的调查可以与合并的库存进行比较,并且响应于比较,可以在针对相应的客户端计算系统的至少一个调查中检测到文件属性变化的错误模式。 此后,这种错误的模式可以被归类为良性事件或恶意软件攻击之一。 最后,如果异常模式被分类为恶意软件攻击,则可以在相应的客户端计算系统中请求恶意软件删除。