会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Server blade network boot method that minimizes required network bandwidth
    • 服务器刀片式网络引导方法,可最大限度地减少所需的网
    • US07350068B2
    • 2008-03-25
    • US11112132
    • 2005-04-22
    • Jeffrey Wayne AndersonSimon ChuRichard Alan DayanPeter Thomas Donovan
    • Jeffrey Wayne AndersonSimon ChuRichard Alan DayanPeter Thomas Donovan
    • G06F15/177G06F15/16
    • G06F9/4405
    • A system remotely boots a plurality of server blades in a blade center to update each blade. A temporary network is created to provide an out-of-band communication channel between a management module and the plurality of server blades. The management module receives and saves the original boot sequence for each server blade and alters each boot sequence such that each server blade begins with a network boot. After receiving an initial transmission over the network containing server blade boot instructions and storing the boot instructions in a temporary boot server, subsequent server blade boot requests from the network are intercepted and the stored boot instructions are re-routed from the temporary boot server to each of the remaining blades in the blade server thus removing the need for repeated boot packet transmission over the network.
    • 系统远程启动刀片中心中的多个服务器刀片以更新每个刀片。 创建临时网络以在管理模块和多个服务器刀片之间提供带外通信信道。 管理模块接收并保存每个服务器刀片的原始引导顺序,并更改每个引导顺序,以使每个服务器刀片以网络引导开始。 在收到包含服务器刀片引导指令的网络上的初始传输并将引导指令存储在临时引导服务器中之后,将拦截来自网络的后续服务器刀片引导请求,并将存储的引导指令从临时引导服务器重新路由到每个 的刀片服务器中的剩余刀片,从而消除了对通过网络重复引导分组传输的需要。
    • 9. 发明授权
    • Method to reduce disk access time during predictable loading sequences
    • 在可预测的加载序列期间减少磁盘访问时间的方法
    • US07464250B2
    • 2008-12-09
    • US10798091
    • 2004-03-11
    • Richard Alan DayanJames Franklin Macon, Jr.
    • Richard Alan DayanJames Franklin Macon, Jr.
    • G06F9/06
    • G06F12/0862G06F12/0866
    • The invention discloses a method for loading data from a disk. The method may comprise comparing a current sequence of disk requests to data indicative of a previous disk request sequence. Responsive to detecting a match between the current disk sequence and the previous disk I/O sequence, a copy of data blocks accessed during the current disk sequence may be stored in a contiguous portion of the disk. Responsive to a subsequent request for data in the disk sequence, the request may be mapped to and serviced from the sequential portion of the disk: The continuous portion of the disk to which the data is copied may be on a different partition of the disk than a disk partition on which the original data is stored. A sequence of disk accesses may be recorded. Responsive to retrieving data from the continuous portion, additional data from the contiguous portion of the disk may be prefetched and may be cached in a buffer. Responsive to an I/O request, it may be determined whether the requested data resides in the buffer, and if so, the data from the buffer may be retrieved without accessing the hard disk. In an exemplary embodiment, the disk sequence may represent a boot sequence of the system.
    • 本发明公开了一种从盘载入数据的方法。 该方法可以包括将磁盘请求的当前序列与表示先前磁盘请求序列的数据进行比较。 响应于检测当前磁盘序列与先前的磁盘I / O序列之间的匹配,在当前磁盘序列期间访问的数据块的副本可以存储在磁盘的连续部分中。 响应于对磁盘序列中的数据的后续请求,请求可以被映射到磁盘的顺序部分并从其服务:数据被复制到的盘的连续部分可以在磁盘的不同分区上 存储原始数据的磁盘分区。 可以记录一系列磁盘访问。 响应于从连续部分检索数据,来自盘的连续部分的附加数据可以被预取并且可以被缓存在缓冲器中。 响应于I / O请求,可以确定所请求的数据是否位于缓冲器中,如果是,则可以在不访问硬盘的情况下检索来自缓冲器的数据。 在示例性实施例中,盘序列可以表示系统的引导顺序。
    • 10. 发明授权
    • Method for protecting a user's password
    • 保护用户密码的方法
    • US07444517B2
    • 2008-10-28
    • US10860363
    • 2004-06-03
    • Richard Alan DayanJeffery Bart Jennings
    • Richard Alan DayanJeffery Bart Jennings
    • H04K1/00
    • G06F21/31
    • The present invention relates to a method for protecting a password. In a first aspect, the method includes allowing a user to enter an apparent password into a computing system, wherein the apparent password is a string of characters and keystrokes including the password and an arbitrary number of non-password related characters and keystrokes. The method further includes analyzing the string of characters and keystrokes by the computing system to find the password, and validating the apparent password if the password is found in any position in the string of characters and keystrokes. In a second aspect, the method includes creating a random pattern in response to receiving a request from a user to access a protected resource in a computing system, wherein the random pattern is associated with the request, displaying the random pattern associated with the request to the user, and allowing the user to enter an apparent password into the computing system that controls access to the protected resource, wherein the apparent password is a string of characters and keystrokes including the password, the random pattern and an arbitrary number of non-password related characters and keystrokes. The method further includes analyzing the string of characters and keystrokes by the computing system to find the password and the random pattern associated with the request, and validating the apparent password if the password and the random pattern are found in any position in the string of characters and keystrokes.
    • 本发明涉及一种保护密码的方法。 在第一方面,该方法包括允许用户将明显密码输入到计算系统中,其中明文密码是包括密码和任意数量的非密码相关字符和按键的字符串和键盘串。 该方法还包括分析计算系统的字符串和击键以找到密码,并且如果在字符串和击键中的任何位置找到密码,则验证该密码。 在第二方面,所述方法包括响应于接收来自用户访问计算系统中的受保护资源的请求而创建随机模式,其中所述随机模式与所述请求相关联,显示与所述请求相关联的随机模式 并且允许用户输入到控制对受保护资源的访问的计算系统中的明显密码,其中,明文密码是包括密码,随机模式和任意数量的非密码的字符串和击键 相关字符和按键。 该方法还包括分析计算系统的字符串和按键,以找到与请求相关联的密码和随机模式,并且如果在字符串中的任何位置找到密码和随机模式,则验证明密密码 和击键。