会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 94. 发明授权
    • Relay node authentication method, apparatus, and system
    • 中继节点认证方法,设备和系统
    • US09027111B2
    • 2015-05-05
    • US13564173
    • 2012-08-01
    • Dongmei ZhangAiqin ZhangXiaoyu BiJing Liu
    • Dongmei ZhangAiqin ZhangXiaoyu BiJing Liu
    • H04L29/06H04K1/00H04W12/06H04L9/32H04W76/02G06F15/16G06F17/30
    • H04W12/06H04L9/3263H04L63/0823H04W76/15
    • Embodiments of the present invention disclose a relay node authentication method, apparatus, and system. The method provided in an embodiment of the present invention includes: sending, by a relay node, an authentication request message to a peer node, where the authentication request message includes a certificate of the relay node, so that the peer node authenticates the relay node according to the certificate of the relay node, where the peer node is a network side node or a security gateway in a security domain where the network side node is located; and receiving, by the relay node, an authentication response message sent by the peer node, where the authentication response message includes a certificate of the peer node, and authenticating the peer node according to the certificate of the peer node.
    • 本发明的实施例公开了一种中继节点认证方法,装置和系统。 本发明实施例提供的方法包括:由中继节点将认证请求消息发送给对等节点,其中认证请求消息包括中继节点的证书,使得对等节点认证中继节点 根据中继节点的证书,其中对等节点是网络侧节点或网络侧节点所在的安全域中的安全网关; 并且由所述中继节点接收由所述对等节点发送的认证响应消息,所述认证响应消息包括所述对等节点的证书,并且根据所述对等节点的证书认证所述对等节点。
    • 95. 发明授权
    • Error report processing using call stack similarity
    • 使用调用堆栈相似性的错误报告处理
    • US08949675B2
    • 2015-02-03
    • US12957090
    • 2010-11-30
    • Dongmei ZhangYingnong DangSong Ge
    • Dongmei ZhangYingnong DangSong Ge
    • G06F11/00G06F11/07
    • G06F11/0781G06F11/0775G06F11/0778G06F11/0787
    • Techniques for error report processing are described herein. Error reports, received by a developer due to program crashes, may be organized into a plurality of “buckets.” The buckets may be based in part on a name and a version of the application associated with a crash. Additionally, a call stack of the computer on which the crash occurred may be associated with each error report. The error reports may be “re-bucketed” into meta-buckets to provide additional information to programmers working to resolve software errors. The re-bucketing may be based in part on measuring similarity of call stacks of a plurality of error reports. The similarity of two call stacks—a measure of likelihood that two error reports were caused by a same error—may be based in part on functions in common, a distance of those functions from the crash point, and an offset distance between the common functions.
    • 这里描述了用于错误报告处理的技术。 开发人员由于程序崩溃而收到的错误报告可以被组织成多个“桶”。桶可以部分地基于与崩溃相关联的应用的名称和版本。 此外,发生崩溃的计算机的调用堆栈可能与每个错误报告相关联。 错误报告可能会重新分级到元数据桶中,以便为解决软件错误的程序员提供更多信息。 可以部分地基于测量多个错误报告的调用堆栈的相似度来重新估计。 两个调用堆栈的相似性 - 两个错误报告由相同错误引起的可能性的度量可能部分地基于共同的功能,这些功能与碰撞点的距离以及公共功能之间的偏移距离 。