会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Policy-based approach for managing the export of network flow statistical data
    • 用于管理网络流统计数据导出的基于策略的方法
    • US07143006B2
    • 2006-11-28
    • US11088325
    • 2005-03-23
    • Xiaoxue MaPaul Harry GleichaufPaul Atkins
    • Xiaoxue MaPaul Harry GleichaufPaul Atkins
    • G06F17/08
    • H04L43/00H04L41/0893H04L41/22H04L43/026
    • A policy-based approach for managing the export of network flow statistical data uses constraints and prioritization to select flow data to be exported by flow monitoring processes. According to the approach, a flow monitoring process monitors a plurality of flows at an observation point. The flow monitoring process generates flow statistical data for the plurality of flows. Policy data is made available to the flow monitoring process and includes constraint data and priority data. The constraint data indicates usage constraints for one or more resources available to the flow monitoring process. The priority data indicates a desired priority of flow attributes. The flow monitoring process uses the policy data to select one or more flows from the plurality of flows, such that the resource usage constraints are satisfied. The flow monitoring process exports a portion of the flow statistical data that corresponds to the selected one or more flows.
    • 用于管理网络流统计数据导出的基于策略的方法使用约束和优先级来选择要由流监视进程导出的流数据。 根据该方法,流量监视处理在观察点监视多个流。 流量监视过程产生用于多个流的流统计数据。 政策数据可用于流量监控过程,并包括约束数据和优先级数据。 约束数据指示对于流监视过程可用的一个或多个资源的使用限制。 优先级数据表示流属性的期望优先级。 流监视处理使用策略数据来选择来自多个流的一个或多个流,从而满足资源使用约束。 流量监视过程导出对应于所选择的一个或多个流的流统计数据的一部分。
    • 5. 发明授权
    • Offload stack for network, block and file input and output
    • 卸载堆栈用于网络,块和文件的输入和输出
    • US08156230B2
    • 2012-04-10
    • US13069304
    • 2011-03-22
    • Mark BakkeTimothy KuikDavid ThompsonPaul GleichaufXiaoxue Ma
    • Mark BakkeTimothy KuikDavid ThompsonPaul GleichaufXiaoxue Ma
    • G06F15/16
    • G06F9/45558G06F9/5027G06F2009/45595G06F2209/509
    • An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.
    • 用于从操作系统卸载网络,块和文件功能的装置包括耦合到网络的用于接收分组流的网络接口; 每个处理器具有一个或多个处理器核心; 携带一个或多个操作系统的计算机可读介质和托管在一个或多个处理器核心中的输入/输出网络堆栈。 网络堆栈在操作系统之间共享。 网络堆栈包括指令,当被执行时,在内部网络,块和文件系统接口处接收来自操作系统之一的数据传输请求,并允许数据在内部接口和多个外部接口之间传输, 操作系统执行数据传输并代表操作系统执行数据传输。
    • 6. 发明申请
    • OFFLOAD STACK FOR NETWORK, BLOCK AND FILE INPUT AND OUTPUT
    • 网络,块和文件输入和输出的卸载堆栈
    • US20110173295A1
    • 2011-07-14
    • US13069304
    • 2011-03-22
    • Mark BakkeTimothy KuikDavid ThompsonPaul GleichaufXiaoxue Ma
    • Mark BakkeTimothy KuikDavid ThompsonPaul GleichaufXiaoxue Ma
    • G06F15/16
    • G06F9/45558G06F9/5027G06F2009/45595G06F2209/509
    • An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.
    • 用于从操作系统卸载网络,块和文件功能的装置包括耦合到网络的用于接收分组流的网络接口; 每个处理器具有一个或多个处理器核心; 携带一个或多个操作系统的计算机可读介质和托管在一个或多个处理器核心中的输入/输出网络堆栈。 网络堆栈在操作系统之间共享。 网络堆栈包括指令,当被执行时,在内部网络,块和文件系统接口处接收来自操作系统之一的数据传输请求,并允许数据在内部接口和多个外部接口之间传输, 操作系统执行数据传输并代表操作系统执行数据传输。
    • 7. 发明授权
    • Network context triggers for activating virtualized computer applications
    • 用于激活虚拟化计算机应用程序的网络上下文触发器
    • US08127412B2
    • 2012-03-06
    • US11731728
    • 2007-03-30
    • Paul GleichaufMark BakkeTimothy KuikDavid ThompsonXiaoxue Ma
    • Paul GleichaufMark BakkeTimothy KuikDavid ThompsonXiaoxue Ma
    • G06F11/00G06F12/14G06F12/16G08B23/00
    • G06F11/1415H04L63/1433H04L67/306
    • A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the vulnerability profiles, and to cause the remedial action.
    • 一种计算机系统,包括托管操作系统和应用程序的至少一个受控执行空间; 耦合到受控执行空间的漏洞监视代理; 耦合到所述漏洞监视代理的一个或多个漏洞简档,其中所述漏洞简档中的每一个包括应用程序标识符,操作系统标识符,描述应用程序标识符在执行操作时指示的应用程序的漏洞的漏洞规范 操作系统标识符指示的系统以及在执行时将补救该漏洞的补救措施; 其中所述漏洞监视代理被配置为监视所述受控执行空间中的所述操作系统和所述应用程序的执行,以检测与所述漏洞相关联的异常,以基于所述操作系统和应用程序之一来确定所述操作系统和应用程序的补救动作 漏洞简介,并采取补救措施。
    • 9. 发明授权
    • Offload stack for network, block and file input and output
    • 卸载堆栈用于网络,块和文件的输入和输出
    • US07949766B2
    • 2011-05-24
    • US11472678
    • 2006-06-21
    • Mark BakkeTimothy KuikDavid ThompsonPaul GleichaufXiaoxue Ma
    • Mark BakkeTimothy KuikDavid ThompsonPaul GleichaufXiaoxue Ma
    • G06F15/16
    • G06F9/45558G06F9/5027G06F2009/45595G06F2209/509
    • An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.
    • 用于从操作系统卸载网络,块和文件功能的装置包括耦合到网络的用于接收分组流的网络接口; 每个处理器具有一个或多个处理器核心; 携带一个或多个操作系统的计算机可读介质和托管在一个或多个处理器核心中的输入/输出网络堆栈。 网络堆栈在操作系统之间共享。 网络堆栈包括指令,当被执行时,在内部网络,块和文件系统接口处接收来自操作系统之一的数据传输请求,并允许数据在内部接口和多个外部接口之间传输, 操作系统执行数据传输并代表操作系统执行数据传输。
    • 10. 发明申请
    • Network context triggers for activating virtualized computer applications
    • 激活虚拟化计算机应用程序的网络上下文触发器
    • US20080244747A1
    • 2008-10-02
    • US11731728
    • 2007-03-30
    • Paul GleichaufMark BakkeTimothy KuikDavid ThompsonXiaoxue Ma
    • Paul GleichaufMark BakkeTimothy KuikDavid ThompsonXiaoxue Ma
    • G06F11/00
    • G06F11/1415H04L63/1433H04L67/306
    • A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the vulnerability profiles, and to cause the remedial action.
    • 一种计算机系统,包括托管操作系统和应用程序的至少一个受控执行空间; 耦合到受控执行空间的漏洞监视代理; 耦合到所述漏洞监视代理的一个或多个漏洞简档,其中所述漏洞简档中的每一个包括应用程序标识符,操作系统标识符,描述应用程序标识符在执行操作时指示的应用程序的漏洞的漏洞规范 操作系统标识符指示的系统以及在执行时将补救该漏洞的补救措施; 其中所述漏洞监视代理被配置为监视所述受控执行空间中的所述操作系统和所述应用程序的执行,以检测与所述漏洞相关联的异常,以基于所述操作系统和应用程序之一来确定所述操作系统和应用程序的补救动作 漏洞简介,并采取补救措施。