会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 6. 发明申请
    • User interface for piecemeal restore
    • 用于界面恢复的用户界面
    • US20070168401A1
    • 2007-07-19
    • US11326079
    • 2006-01-05
    • Aditya KapoorWenlu MaCraig Duncan
    • Aditya KapoorWenlu MaCraig Duncan
    • G06F17/30
    • G06F11/1451G06F11/1469G06F2201/80
    • This disclosure concerns systems and methods for restoring data. In one example, a method for piecemeal restoration of a database involves a computer system having a user interface and a selection device. The method begins when a query is sent to a database server application requesting a list of all offline filegroups for the database. Next, the list of all offline filegroups is received from the database server application. Then, the list of all offline filegroups is automatically presented on the user interface. Next, a list selection signal is received, indicative of the selection device designating one or more of the filegroups from the list. Finally, in response to the receipt of the list selection signal, a command is automatically formulated to bring the designated one or more filegroups online.
    • 本公开涉及恢复数据的系统和方法。 在一个示例中,用于零碎地恢复数据库的方法涉及具有用户界面和选择装置的计算机系统。 当查询发送到请求数据库的所有脱机文件组的列表的数据库服务器应用程序时,该方法开始。 接下来,从数据库服务器应用程序接收到所有脱机文件组的列表。 然后,所有脱机文件组的列表将自动显示在用户界面上。 接下来,接收列表选择信号,指示选择装置从列表中指定一个或多个文件组。 最后,响应于接收到列表选择信号,自动地制定一个命令以使指定的一个或多个文件组联机。
    • 7. 发明授权
    • Negative light-weight rules
    • 负重的轻量级规则
    • US09384349B2
    • 2016-07-05
    • US13476869
    • 2012-05-21
    • Aditya KapoorGuy Roberts
    • Aditya KapoorGuy Roberts
    • G06F21/00G06F21/56G06F21/55
    • G06F21/56G06F21/554
    • A method for securing an electronic device includes, at a level below all of the operating systems of an electronic device, trapping a first attempt and second attempt to access sensitive system resources of the electronic device. The method also includes identifying the first attempt and second attempt as representing a potential malware attack, comparing the sequence of the first attempt and second attempt against a first anti-malware rule, and, based on the comparison of the sequence of the first attempt and second attempt against the first anti-malware rule, allowing the second attempt. The first attempt and second attempt originate from code of the same operating entity. The first anti-malware rule includes a requirement of a sequence of attempts including the first attempt followed by the second attempt.
    • 一种用于固定电子设备的方法包括在电子设备的所有操作系统下方的级别上,捕获第一尝试和第二次尝试来访问电子设备的敏感系统资源。 该方法还包括将第一尝试和第二尝试识别为表示潜在的恶意软件攻击,将第一尝试和第二尝试的顺序与第一反恶意软件规则进行比较,并且基于第一尝试的顺序与 第二次尝试反对第一个反恶意软件规则,允许第二次尝试。 第一次尝试和第二次尝试来自相同操作实体的代码。 第一个反恶意软件规则包括一系列尝试的要求,包括第一次尝试,然后是第二次尝试。
    • 10. 发明授权
    • Restore optimization
    • 恢复优化
    • US08315986B1
    • 2012-11-20
    • US12004735
    • 2007-12-24
    • Aditya KapoorChristopher Hercules ClaudatosWilliam Dale Andruss
    • Aditya KapoorChristopher Hercules ClaudatosWilliam Dale Andruss
    • G06F17/30
    • G06F11/1453G06F11/1464G06F11/1469
    • A method, article of manufacture, and apparatus for protecting data, comprising receiving information about objects stored on a plurality of hosts, determining whether an object needs to be backed up, and if the object needs to be backed up, requesting each host having the object to provide a portion of the object to a target. Information about the objects and backup may be stored in an index. A requesting host may request an object to be restored to a target. It is determined whether the object is available at the backup and at other hosts, and the backup and hosts having the object may be requested to provide portions of the object to the target, which may be the requesting host. The index may be used to determine availability of the object at the backup and other hosts.
    • 一种用于保护数据的方法,制品和装置,包括接收关于存储在多个主机上的对象的信息,确定是否需要备份对象,以及如果需要备份对象,请求具有 对象以将对象的一部分提供给目标。 有关对象和备份的信息可能存储在索引中。 请求主机可以请求将对象还原到目标。 确定对象在备份和其他主机是否可用,并且具有对象的备份和主机可能被请求,以将对象的一部分提供给目标,其可以是请求主机。 索引可用于确定备份和其他主机上对象的可用性。