会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明授权
    • Recirculation fan and fan assembly thereof
    • 再循环风扇及其风扇组件
    • US09051939B2
    • 2015-06-09
    • US13479906
    • 2012-05-24
    • Shun-Chen ChangWen-Bin Liu
    • Shun-Chen ChangWen-Bin Liu
    • F04D25/08F04D25/12F04D29/54
    • F04D25/082F04D19/002F04D19/026F04D25/022F04D25/024F04D25/026F04D25/12F04D25/166F04D29/541
    • A recirculation fan includes a casing, a covering member, and a fan assembly. The casing has a base. The covering member is coupled with the casing to define an accommodation space. The fan assembly is disposed within the accommodation space, and includes a first impeller, a second impeller, a motor, and a plurality of magnetic elements. The second impeller is located beside the first impeller. The motor is fixed on the base of the casing and connected with the first impeller for driving rotation of the first impeller. The magnetic elements are arranged between the first impeller and the second impeller. A wind force generated by the first impeller and a magnetic torque resulted from a magnetic vortex of the magnetic elements cause contactless rotation of the second impeller.
    • 再循环风扇包括壳体,覆盖构件和风扇组件。 外壳有一个底座。 覆盖构件与壳体联接以限定容纳空间。 风扇组件设置在容纳空间内,并且包括第一叶轮,第二叶轮,马达和多个磁性元件。 第二个叶轮位于第一个叶轮旁边。 电动机固定在壳体的底部上并与第一叶轮连接,用于驱动第一叶轮的转动。 磁性元件布置在第一叶轮和第二叶轮之间。 由第一叶轮产生的风力和由磁性元件的磁涡流产生的磁力矩引起第二叶轮的非接触式旋转。
    • 9. 发明授权
    • Matching with a large vulnerability signature ruleset for high performance network defense
    • 与高性能网络防御的大型漏洞签名规则集相匹配
    • US08522348B2
    • 2013-08-27
    • US12846541
    • 2010-07-29
    • Yan ChenZhichun LiGao XiaBin Liu
    • Yan ChenZhichun LiGao XiaBin Liu
    • G06F11/00
    • H04L63/1416H04L63/1433H04L69/22
    • Systems, methods, and apparatus are provided for vulnerability signature based Network Intrusion Detection and/or Prevention which achieves high throughput comparable to that of the state-of-the-art regex-based systems while offering improved accuracy. A candidate selection algorithm efficiently matches thousands of vulnerability signatures simultaneously using a small amount of memory. A parsing transition state machine achieves fast protocol parsing. Certain examples provide a computer-implemented method for network intrusion detection. The method includes capturing a data message and invoking a protocol parser to parse the data message. The method also includes matching the parsed data message against a plurality of vulnerability signatures in parallel using a candidate selection algorithm and detecting an unwanted network intrusion based on an outcome of the matching.
    • 提供了基于漏洞签名的网络入侵检测和/或预防的系统,方法和装置,其实现了与现有技术的基于正则表达式的系统相当的高吞吐量,同时提供了更高的精度。 候选者选择算法使用少量内存同时有效地匹配数千个漏洞签名。 解析过渡状态机实现快速协议解析。 某些示例提供用于网络入侵检测的计算机实现的方法。 该方法包括捕获数据消息并调用协议解析器来解析数据消息。 该方法还包括使用候选选择算法并行地解析解析的数据消息与多个脆弱性签名并且基于匹配的结果来检测不需要的网络入侵。