会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method and system to detect breaks in a border of a computer network
    • 检测计算机网络边界断点的方法和系统
    • US08341748B2
    • 2012-12-25
    • US12314879
    • 2008-12-18
    • John L. TraenkenschuhTerry E. JonesRichard V. Rosetto
    • John L. TraenkenschuhTerry E. JonesRichard V. Rosetto
    • G06F11/00G06F12/14G08B23/00
    • H04L63/1408
    • A method for detecting breaks in a border of a network is disclosed. The method may include monitoring network regulation and shaping traffic passing through the border. The method may also include providing, by a first confederate server on a first side of the border, a first connection request to a second confederate server on a second side of the border. Further, the method may include providing, by the second confederate server on the second side of the border, a second connection request to the first confederate server on the first side of the border. The method may also include executing a network diagnostic command if one or more of the first or second connection request is granted. Further, the method may also include copying any outputs of the network diagnostic command to a file.
    • 公开了一种用于检测网络边界断裂的方法。 该方法可以包括监视网络调节和整形通过边界的流量。 该方法还可以包括由边界的第一侧上的第一联盟服务器向边界的第二侧上的第二联盟服务器提供第一连接请求。 此外,该方法可以包括由边界的第二侧上的第二联盟服务器向边界的第一侧上的第一联盟服务器提供第二连接请求。 该方法还可以包括如果授予了第一或第二连接请求中的一个或多个,则执行网络诊断命令。 此外,该方法还可以包括将网络诊断命令的任何输出复制到文件。
    • 5. 发明申请
    • Method and system to detect breaks in a border of a computer network
    • 检测计算机网络边界断点的方法和系统
    • US20100162384A1
    • 2010-06-24
    • US12314879
    • 2008-12-18
    • John L. TraenkenschuhTerry E. JonesRichard V. Rosetto
    • John L. TraenkenschuhTerry E. JonesRichard V. Rosetto
    • G06F21/00
    • H04L63/1408
    • A method for detecting breaks in a border of a network is disclosed. The method may include monitoring network regulation and shaping traffic passing through the border. The method may also include providing, by a first confederate server on a first side of the border, a first connection request to a second confederate server on a second side of the border. Further, the method may include providing, by the second confederate server on the second side of the border, a second connection request to the first confederate server on the first side of the border. The method may also include executing a network diagnostic command if one or more of the first or second connection request is granted. Further, the method may also include copying any outputs of the network diagnostic command to a file.
    • 公开了一种用于检测网络边界断裂的方法。 该方法可以包括监视网络调节和整形通过边界的流量。 该方法还可以包括由边界的第一侧上的第一联盟服务器向边界的第二侧上的第二联盟服务器提供第一连接请求。 此外,该方法可以包括由边界的第二侧上的第二联盟服务器向边界的第一侧上的第一联盟服务器提供第二连接请求。 该方法还可以包括如果授予了第一或第二连接请求中的一个或多个,则执行网络诊断命令。 此外,该方法还可以包括将网络诊断命令的任何输出复制到文件。
    • 8. 发明授权
    • Securing electronic control unit code
    • 保护电子控制单元代码
    • US08321933B2
    • 2012-11-27
    • US11984178
    • 2007-11-14
    • John L. TraenkenschuhPaul W. BierdemanTodd Wagner
    • John L. TraenkenschuhPaul W. BierdemanTodd Wagner
    • G06F21/00
    • G06F21/572
    • Methods and systems are provided for securing electronic control unit code. In one implementation, a method is provided. According to the method, an order for the program code may be transmitted to a developer. The order may include specifications and an authentication key. The method may further include receiving the program code and the authentication certification from the developer and verifying the authentication certificate to determine whether the developer was an authorized source of the program code. The method may generate metadata identifying the authorized source of the program code and embed the metadata in the program code.
    • 提供了用于确保电子控制单元代码的方法和系统。 在一个实现中,提供了一种方法。 根据该方法,程序代码的顺序可以被发送给开发者。 订单可能包括规格和验证密钥。 该方法还可以包括从开发者接收程序代码和认证证明,并验证认证证书以确定开发者是否是程序代码的授权源。 该方法可以生成标识程序代码的授权源的元数据,并将元数据嵌入到程序代码中。