会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 42. 发明申请
    • Method for controlling file access on computer systems
    • 控制计算机系统文件访问的方法
    • US20070283169A1
    • 2007-12-06
    • US11446737
    • 2006-06-05
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • Howard J. LockerDaryl C. CromerRandall S. SpringfieldRod D. Waltermann
    • H04L9/00G06F12/14H04L9/32G06F11/30
    • G06F12/1475G06F21/78
    • A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.
    • 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。
    • 44. 发明授权
    • Reducing start-up time and avoiding customer-induced system failures for personal computers
    • 减少启动时间,避免客户导致的个人电脑系统故障
    • US06721885B1
    • 2004-04-13
    • US09658130
    • 2000-09-08
    • Joseph Wayne FreemanJoseph Franklin GarveySteven D. GoodmanWilliam Fred Keown, Jr.Randall S. Springfield
    • Joseph Wayne FreemanJoseph Franklin GarveySteven D. GoodmanWilliam Fred Keown, Jr.Randall S. Springfield
    • G06F15177
    • G06F9/4401G06F11/2289
    • Disclosed is a method for reducing power-up time and avoiding customer-induced failures of computer systems during power-up. An intrusion switch, which is connected to the inside frame of the computer system is utilized. The intrusion switch signals the BIOS of the computer system whenever the cover of the computer's system unit is opened. The BIOS controls the POST operation during power-up of the computer system. During an initial power-up of the computer system, the POST configuration code examines and configures the hardware and sets the applicable registers, etc. At the end of the POST configuration code, the register values are stored in non-volatile storage. During a subsequent power-up of the computer system, a check is made to see if the cover of the system had been opened. When the cover has not been opened, the BIOS assumes that no changed has occurred in the hardware configuration and the BIOS restores the register values from non-volatile storage without completing the POST operation. When the cover has been opened, the BIOS discards the register values and initiates the POST operation, i.e., a full configuration operation is performed and new values stored in the registers and non-volatile storage element.
    • 公开了一种在上电期间减少上电时间并避免客户导致的计算机系统故障的方法。 使用连接到计算机系统的内部框架的入侵开关。 每当打开计算机系统单元的盖子时,入侵开关就会通知计算机系统的BIOS。 BIOS在电脑系统启动期间控制POST操作。 在计算机系统的初始上电期间,POST配置代码检查和配置硬件并设置适用的寄存器等。在POST配置代码结束时,寄存器值存储在非易失性存储器中。 在计算机系统的随后上电期间,检查系统的盖是否已打开。 当盖子尚未打开时,BIOS假定在硬件配置中没有发生任何变化,BIOS会从非易失性存储器中恢复寄存器值,而无需完成POST操作。 当盖子打开时,BIOS将丢弃寄存器值并启动POST操作,即执行完整配置操作,并将新值存储在寄存器和非易失性存储元件中。
    • 45. 发明授权
    • Computer system which is disabled when it is disconnected from a network
    • 计算机系统在与网络断开连接时被禁用
    • US6105136A
    • 2000-08-15
    • US23606
    • 1998-02-13
    • Daryl C. CromerBrandon J. EllisonHoward J. LockerMichael J. SteinmetzRandall S. SpringfieldJames P. Ward
    • Daryl C. CromerBrandon J. EllisonHoward J. LockerMichael J. SteinmetzRandall S. SpringfieldJames P. Ward
    • G06F1/00G06F21/78G06F21/86G06F11/30
    • G06F21/86G06F21/78
    • Described is a computer system which is coupled to a remote computer via a data communication link. The computer system has a normally closed enclosure and is capable of securing data retained within the system against unauthorized access. The computer system includes an erasable memory element mounted within the enclosure for selective activation to active and inactive states and for receiving and storing a security password when in the active state. A manually operable option switch is mounted within the enclosure. The option switch is operatively connected with the erasable memory element and manually settable by a user of the computer system for setting the erasable memory element to the active and inactive states. A communication line detector is operatively connected with the erasable memory element for detecting a disconnection of the data communication link and for clearing any stored security password from the erasable memory element in response to a change of the communication link detector between a first state and a second state.
    • 描述了经由数据通信链路耦合到远程计算机的计算机系统。 计算机系统具有常闭外壳,并且能够保护系统中保留的数据,防止未经授权的访问。 计算机系统包括安装在机箱内的可擦除存储器元件,用于选择性地激活到主动和非活动状态,并且在处于活动状态时接收和存储安全密码。 手动可操作的选项开关安装在外壳内。 选项开关可操作地与可擦除存储元件连接,并且可由计算机系统的用户手动设置,用于将可擦除存储器元件设置为活动状态和非活动状态。 通信线路检测器可操作地与可擦除存储器元件连接,用于响应于通信链路检测器在第一状态和第二状态之间的变化来检测数据通信链路的断开并用于从可擦除存储器元件清除任何存储的安全密码 州。