会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • OVERSAMPLED CHANNEL RESPONSE IDENTIFICATION
    • 超声波通道响应识别
    • WO2008059406A1
    • 2008-05-22
    • PCT/IB2007/054535
    • 2007-11-08
    • INTERNATIONAL BUSINESS MACHINES CORPORATIONCHERUBINI, GiovanniELEFTHERIOU, Evangelos, S.HUTCHINS, Robert, AllenJAQUETTE, Glen, AlanOELCER, Sedat
    • CHERUBINI, GiovanniELEFTHERIOU, Evangelos, S.HUTCHINS, Robert, AllenJAQUETTE, Glen, AlanOELCER, Sedat
    • G11B20/10H04L25/03
    • G11B20/10009G11B20/10046G11B20/10212H04B1/7085H04J2013/0037H04L25/0212H04L25/03038
    • Methods, apparatus and computer programs are provided for multiplication-free identification of the impulse response of an oversampled data channel (3). An input ( a ) comprising a pseudo-random binary sequence of L symbols is supplied to the channel (3) at a symbol rate of 1/T. A channel output ( z ) is produced by sampling a channel output signal corresponding to the input (a) with a sampling interval T s = (q/p)T, where q and p are relative prime integers with q P(j)) are produced from the channel output ( z ) by selecting, for each polyphase sequence ( P(j)) , every p th sample of the channel output ( z ), with a phase shift of one sample between successive polyphase sequences ( p(j) ). A decimated binary sequence ( b ) is produced by selecting every q th symbol of the channel input ( a ). Each polyphase sequence ( p(j) ) is correlated with the decimated binary sequence ( b ), the two possible binary values being of equal magnitude and opposite sign for the correlation. The correlation results are accumulated to produce a correlated output sequence ( c(j) ) for that polyphase sequence (p(j) ). The samples of the correlated output sequences ( c(j) ) are then interleaved in phase order of the corresponding polyphase sequences ( p(j) ) to produce the impulse response of the channel.
    • 提供了方法,装置和计算机程序,用于对过采样数据信道(3)的脉冲响应进行无乘法识别。 包含L个符号的伪随机二进制序列的输入(a)以符号率1 / T提供给信道(3)。 通过以采样间隔T(t / p)T对与输入(a)相对应的通道输出信号进行采样来产生通道输出(z),其中q和p是相对第一整数 对于q 个符号来产生抽取的二进制序列(b)。 每个多相序列(p(j))与抽取的二进制序列(b)相关,两个可能的二进制值相等,相关的符号相反。 累积相关结果以产生该多相序列(p(j))的相关输出序列(c(j))。 然后,相关输出序列(c(j))的样本以对应的多相序列(p(j))的相位顺序进行交织,以产生信道的脉冲响应。
    • 5. 发明申请
    • STORING EEDKS TO TAPE OUTSIDE OF USER DATA AREA
    • 存储用户数据区外的屏幕
    • WO2008028768A1
    • 2008-03-13
    • PCT/EP2007/058433
    • 2007-08-15
    • INTERNATIONAL BUSINESS MACHINES CORPORATIONIBM UNITED KINGDOM LIMITEDJAQUETTE, Glen, AlanGRECO, Paul, Merrill
    • JAQUETTE, Glen, AlanGRECO, Paul, Merrill
    • G06F21/02
    • G06F21/80
    • A method, system and program are provided for enabling access to encrypted data in a storage cartridge by wrapping the data key used to encrypt the data with one or more encryption keys (e.g., a public key from a public/private key pair) to form one or more encryption encapsulated data keys (EEDKs) and then storing the EEDK(s) on the storage cartridge along with the encrypted data in one or more location that are distinct from the encrypted data. The encrypted data may be decoded by retrieving the EEDK from the storage cartridge, decrypting the EEDK with a decryption key (e.g., the private key from the public/private key pair) to extract the underlying data key, and then using the extracted data key to decrypt the encrypted data. By storing the EEDKs separately from the encrypted data, the EEDKs may be updated independently of the corresponding encrypted data.
    • 提供了一种方法,系统和程序,用于通过用一个或多个加密密钥(例如,公共/私人密钥对的公共密钥)包裹用于加密数据的数据密钥来使得能够访问存储盒中的加密数据,以形成 一个或多个加密封装数据密钥(EEDK),然后将EEDK与加密数据一起存储在与加密数据不同的一个或多个位置中。 可以通过从存储盒检索EEDK来解密加密数据,使用解密密钥(例如,公/私钥对中的私钥)解密EEDK以提取底层数据密钥,然后使用提取的数据密钥 解密加密数据。 通过将EEDK与加密数据分开存储,EEDK可以独立于对应的加密数据进行更新。
    • 8. 发明申请
    • MANAGING OWNERSHIP OF REDUNDANT DATA IN STORAGE SYSTEM
    • 管理存储系统中冗余数据的所有权
    • WO2012041603A1
    • 2012-04-05
    • PCT/EP2011/064282
    • 2011-08-19
    • INTERNATIONAL BUSINESS MACHINES CORPORATIONIBM UNITED KINGDOM LIMITEDJAQUETTE, Glen, Alan
    • JAQUETTE, Glen, Alan
    • G06F3/06G06F21/00
    • G06F3/0649G06F3/0611G06F3/0622G06F3/0685H04N21/2182
    • A storage system includes a first storage tier; a second storage tier; logic for storing instances of a file in the first storage tier and the second storage tier; logic for receiving a request to access the file or instance thereof from a user in a group of users; logic for providing the user requesting access to the file with remote access to an instance of the file on the first storage tier that is not being used by any other user in the group of users; logic for setting an ownership status of the instance of the file on the first storage tier to owned by the user requesting access to the file; and logic for setting an ownership status of an unused instance of the file on the second storage tier from owned by the user requesting access to the file to unowned or owned by a second user which previously owned the instance of the file on the first storage tier.
    • 存储系统包括第一存储层; 第二存储层; 在第一存储层和第二存储层中存储文件的实例的逻辑; 用于从一组用户中的用户接收访问所述文件或其实例的请求的逻辑; 提供用户请求访问所述文件的逻辑,所述文件远程访问所述第一存储层上的所述文件的实例,所述文件的所述实例未被所述用户组中的任何其他用户使用; 将用于请求访问该文件的用户拥有的第一存储层上的文件的实例的所有权状态设置为逻辑; 以及逻辑,用于设置所述第二存储层上的所述文件的未使用实例的所有权状态,所述第二存储层的所述未使用实例从所述用户所拥有的请求对所述文件的访问,以由先前拥有所述文件的所述第一存储层 。