会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Enabling network communication from role based authentication
    • 从基于角色的身份验证启用网络通信
    • US07657926B1
    • 2010-02-02
    • US10804927
    • 2004-03-19
    • Steven T. Baker
    • Steven T. Baker
    • H04L9/32
    • H04L63/0263G06F2221/2147G06F2221/2149H04L63/08
    • Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.
    • 网络通信在没有用户正确登录和验证的客户端上得到保护。 客户端禁用发送和/或接收功能。 当用户登录到客户端并被正确认证时,传输和/或接收功能被启用。 在一些实施例中,客户端然后可以下载防火墙策略信息,以防止客户端在特定端口或某些客户端上进行通信。 防火墙策略信息可能特定于用户登录到客户端的角色。 例如,管理员,高管和员工角色可能各自使用不同的防火墙策略信息。
    • 3. 发明申请
    • Dual-processor communication
    • 双处理器通信
    • US20080126752A1
    • 2008-05-29
    • US11497715
    • 2006-08-02
    • Steven T. BakerDouglas J. KoganBenjamin A. KendallJason D. Carnahan
    • Steven T. BakerDouglas J. KoganBenjamin A. KendallJason D. Carnahan
    • G06F15/76G06F9/06
    • G06F15/16
    • A method for dual-processor communication. In one example embodiment, a method includes indicating to a master processor that data is available to transfer to the master processor; receiving a request for the data from the master processor over a storage-based channel; and sending the data to the master processor over the storage-based channel. In another embodiment a method includes determining that data is available for transfer from a slave processor; sending a request for the data to the slave processor over a storage-based channel; and receiving the data from the slave processor over the storage-based channel. In another embodiment a method includes detecting an event on a master processor and writing data corresponding to the event to a slave processor over a storage-based channel.
    • 一种双处理器通信方法。 在一个示例实施例中,一种方法包括向主处理器指示数据可用于传送到主处理器; 通过基于存储的信道从主处理器接收对数据的请求; 并通过基于存储的通道将数据发送到主处理器。 在另一个实施例中,一种方法包括确定数据可用于从从属处理器传送; 通过基于存储的信道向所述从属处理器发送对所述数据的请求; 以及通过基于存储的信道从从属处理器接收数据。 在另一个实施例中,一种方法包括检测主处理器上的事件并且通过基于存储的信道将与事件相对应的数据写入从属处理器。
    • 5. 发明申请
    • MEDIA PLAYER TEST FIXTURE
    • 媒体测试仪
    • US20080133974A1
    • 2008-06-05
    • US11565090
    • 2006-11-30
    • Douglas J. KoganSteven T. Baker
    • Douglas J. KoganSteven T. Baker
    • G06F11/36
    • G06F11/3688
    • Testing media player devices. A method may be practiced, for example, in an automated testing environment. The method includes sending a media oriented command to the media player. The command directs the media player to perform a media function. A trace is received in response to the command. The trace may be generated by a media player as part of the process of attempting to perform functionality related to the command. The trace includes media player information. The information occurs as a result of sending the command to the media player. In response to receiving a trace, a new media oriented command is sent automatically and without human intervention directing the media player to perform a media function. The new media oriented command is dependent on the trace.
    • 测试媒体播放器设备。 例如,可以在自动测试环境中实施一种方法。 该方法包括向媒体播放器发送面向媒体的命令。 该命令指示媒体播放器执行媒体功能。 响应命令接收到跟踪。 作为尝试执行与命令相关的功能的过程的一部分,可以由媒体播放器生成跟踪。 轨迹包括媒体播放器信息。 作为将命令发送到媒体播放器的结果发生信息。 响应于接收到跟踪,新的面向媒体的命令被自动发送,并且没有人为干预,指导媒体播放器执行媒体功能。 新的面向媒体的命令取决于跟踪。
    • 6. 发明申请
    • DYNAMIC STREAM FILE SYSTEM NETWORK SUPPORT
    • 动态流文件系统网络支持
    • US20080027892A1
    • 2008-01-31
    • US11460375
    • 2006-07-27
    • Jason D. CarnahanSteven T. BakerBenjamin A. Kendall
    • Jason D. CarnahanSteven T. BakerBenjamin A. Kendall
    • G06F17/30
    • G06F16/10G06F3/0607G06F3/0643G06F3/067
    • Accessing data from large, unknown size, or streaming files. A method includes acts for accessing files. A request is received to read at a virtual address corresponding to an identifier for a file or directory. The virtual address is read to read a shared address range from the virtual address. The shared address range can be used for a number of files or directories. One of the files or directories may be selected for use at a given time based on the identifier for the file or directory. The shared address range is returned in response to the request. File or directory content data is accessed by means of a read request, received for an address in the shared address range, wherein the shared address range comprises a finite address range, and wherein the shared address range is circular such that if a file or directory exceeds the size of the finite address range, portions exceeding the finite address range can be addressed starting at the beginning of the shared address range.
    • 从大型,未知尺寸或流式文件访问数据。 一种方法包括访问文件的操作。 接收到在与文件或目录的标识符相对应的虚拟地址处读取的请求。 读取虚拟地址以从虚拟地址读取共享地址范围。 共享地址范围可用于多个文件或目录。 可以基于文件或目录的标识符,在给定时间选择其中一个文件或目录来使用。 响应请求返回共享地址范围。 通过对共享地址范围中的地址接收的读请求来访问文件或目录内容数据,其中共享地址范围包括有限地址范围,并且其中共享地址范围是圆形的,使得如果文件或目录 超过有限地址范围的大小,可以从共享地址范围的开始开始寻址超过有限地址范围的部分。
    • 7. 发明授权
    • Enabling network communication from role based authentication
    • 从基于角色的身份验证启用网络通信
    • US08176543B2
    • 2012-05-08
    • US12640195
    • 2009-12-17
    • Steven T. Baker
    • Steven T. Baker
    • G06F17/00
    • H04L63/0263G06F2221/2147G06F2221/2149H04L63/08
    • Network communications are secured on clients that do not have a user properly logged in and authenticated. The clients have transmit and/or receive functionality disabled. When a user logs into the client and is properly authenticated, the transmit and/or receive functionality is enabled. In some embodiments, the client can then download firewall policy information to prevent the client from communicating on certain ports or with certain clients. The firewall policy information may be specific to a role that a user logged into the client has. For example, administrators, executives and employee roles may each use different firewall policy information.
    • 网络通信在没有用户正确登录和验证的客户端上得到保护。 客户端禁用发送和/或接收功能。 当用户登录到客户端并被正确认证时,传输和/或接收功能被启用。 在一些实施例中,客户机然后可以下载防火墙策略信息,以防止客户端在某些端口或某些客户端上进行通信。 防火墙策略信息可能特定于用户登录到客户端的角色。 例如,管理员,高管和员工角色可能各自使用不同的防火墙策略信息。
    • 8. 发明申请
    • Syncronized dual-processor firmware updates
    • 同步化双处理器固件更新
    • US20080052699A1
    • 2008-02-28
    • US11497747
    • 2006-08-02
    • Steven T. BakerDouglas J. Kogan
    • Steven T. BakerDouglas J. Kogan
    • G06F9/44
    • G06F21/572G06F8/61G06F8/63G06F8/65
    • A method for synchronized dual-processor firmware updates. In one example embodiment, a method includes receiving a combined firmware update file, verifying the source of the combined firmware update file, extracting a master firmware image and a slave firmware image from the combined firmware update file, verifying the data integrity of the master firmware image, sending the slave firmware image to the slave processor, receiving a signal from the slave processor indicating that the slave firmware image has been installed, and installing the master firmware image. In another embodiment, a method includes receiving a slave firmware image from the master processor, verifying the data integrity of the slave firmware image, installing the slave firmware image, and sending a signal to the master processor indicating that the slave firmware image has been installed.
    • 一种用于同步双处理器固件更新的方法。 在一个示例实施例中,一种方法包括接收组合的固件更新文件,验证组合的固件更新文件的源,从组合的固件更新文件中提取主固件映像和从属固件映像,验证主固件的数据完整性 图像,将从属固件图像发送到从属处理器,从从属处理器接收指示从属固件映像已经安装的信号,以及安装主固件映像。 在另一个实施例中,一种方法包括从主处理器接收从属固件映像,验证从属固件映像的数据完整性,安装从属固件映像,以及向主处理器发送指示从站固件映像已安装的信号 。