会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Methods and apparatus with virtual identifiers for physical switches in a virtual chassis
    • 具有虚拟机箱中物理交换机的虚拟标识符的方法和设备
    • US08797897B1
    • 2014-08-05
    • US13249963
    • 2011-09-30
    • Megh BhattHarshad NakilRajashekar ReddySaurabh AgarwalShankar Ramanathan
    • Megh BhattHarshad NakilRajashekar ReddySaurabh AgarwalShankar Ramanathan
    • H04L12/26H04Q11/00
    • H04L12/26H04L49/00H04L49/65H04L49/70H04Q11/00
    • In some embodiments, an apparatus includes a first switch having an egress port configured to be coupled to a second switch to collectively to define a single logical entity having a set of virtual identifiers. A first set of virtual identifiers from the set of virtual identifiers is associated with the first switch, a second set of virtual identifiers from the set of virtual identifiers is associated with the second switch. The first switch is configured to receive a forwarding table associating a first set of destination addresses with a set of identifiers local to the first switch and associating a second set of destination addresses with a set of identifiers local to the second switch. Each identifier from the first set of identifiers is uniquely associated the first set of virtual identifiers. Each identifier from the set of identifiers is uniquely associated the second set of virtual identifiers.
    • 在一些实施例中,设备包括具有出口端口的第一交换机,该出口端口被配置为耦合到第二交换机以共同定义具有一组虚拟标识符的单个逻辑实体。 来自该组虚拟标识符的第一组虚拟标识符与第一交换机相关联,来自该组虚拟标识符的第二组虚拟标识符与第二交换机相关联。 第一交换机被配置为接收将第一组目的地地址与第一交换机本地的一组标识符相关联的转发表,并将第二组目的地址与第二交换机本地的一组标识符相关联。 来自第一组标识符的每个标识符与第一组虚拟标识符唯一相关联。 来自标识符集合的每个标识符与第二组虚拟标识符唯一地相关联。
    • 3. 发明授权
    • Adaptive incremental checkpointing
    • 自适应增量检查点
    • US07269706B2
    • 2007-09-11
    • US11008525
    • 2004-12-09
    • Saurabh AgarwalRahul GargMeeta S Gupta
    • Saurabh AgarwalRahul GargMeeta S Gupta
    • G06F12/00
    • G06F11/1451
    • A method, apparatus and computer program product are disclosed for incrementally checkpointing the state of a computer memory in the presence of at least one executing software application at periodic instants. A secure hash function is periodically applied to each partitioned contiguous block of memory to give a periodic block hash value. At each periodic instant, a block hash value for each block is compared with a respective preceding block hash value to determine if said memory block has changed according to whether said block hash values are different. Only changed memory blocks are stored in a checkpoint record. The memory block sizes are adapted at each periodic instant to split changed blocks into at least two parts and to merge only two non-changed contiguous blocks at a time.
    • 公开了一种方法,装置和计算机程序产品,用于在周期性时刻在存在至少一个执行软件应用的情况下递增地检查计算机存储器的状态。 周期性地对每个分区的连续的存储器块应用安全的散列函数以给出周期性的块哈希值。 在每个周期性时刻,将每个块的块哈希值与相应的先前块散列值进行比较,以根据所述块哈希值是否不同来确定所述存储块是否已经改变。 只有更改的内存块才被存储在检查点记录中。 存储器块大小在每个周期性时刻被适配,以将改变的块分成至少两个部分,并且一次仅合并两个未改变的连续块。
    • 5. 发明授权
    • Upgrading system software in a chassis without traffic loss
    • 升级机箱中的系统软件,无流量损失
    • US08499060B2
    • 2013-07-30
    • US12727535
    • 2010-03-19
    • Kumaran NarayananSiva MadasamyAparna AdhavSaurabh AgarwalKalash Nainwal
    • Kumaran NarayananSiva MadasamyAparna AdhavSaurabh AgarwalKalash Nainwal
    • G06F15/177
    • G06F9/4416G06F8/656
    • Rolling software upgrades may be employed for a network device in a modular chassis and/or virtual chassis. The network device may include memory devices to store a software upgrade package and a group of instructions, and a processor. The processors may install the software upgrade package on a backup routing engine; determine subsets of multiple line cards on which to perform a software upgrade, where ports in each of the multiple line cards are part of a link aggregation group (LAG); initiate a reboot process for each of the subsets of multiple line cards, in sequence, where the reboot process for each of the line cards results in a software upgrade without deactivating any LAG. The processors may also switch the backup routing engine and a master routing engine to create a new master routing engine and a new backup routing engine, and install the upgrade package on the new backup routing engine.
    • 可以对模块化机箱和/或虚拟机箱中的网络设备采用滚动软件升级。 网络设备可以包括用于存储软件升级包和一组指令的存储设备以及处理器。 处理器可以在备份路由引擎上安装软件升级包; 确定要执行软件升级的多个线路卡的子集,其中多个线路卡中的每个线路的端口是链路聚合组(LAG)的一部分; 按顺序为多个线路卡的每个子集启动重新启动过程,其中每个线路卡的重新启动过程导致软件升级而不停用任何LAG。 处理器还可以切换备份路由引擎和主路由引擎,以创建新的主路由引擎和新的备份路由引擎,并将升级包安装在新的备份路由引擎上。
    • 7. 发明授权
    • Data embedding scheme with error diffusion
    • 具有误差扩散的数据嵌入方案
    • US06404899B1
    • 2002-06-11
    • US09346104
    • 1999-07-01
    • Saurabh AgarwalAlok AggarwalHarpal Singh BassaliJatin ChhuganiPradeep Kumar Dubey
    • Saurabh AgarwalAlok AggarwalHarpal Singh BassaliJatin ChhuganiPradeep Kumar Dubey
    • G06K900
    • G06T1/0057G06T1/0028G06T2201/0061
    • A method for data embedding in a digital image under the constraint of a pre-specified upper bound value on the amount of change in the value of a property associated with the image. For compression tolerant data hiding in digital images, a property is selected in which the required information can be embedded. The property should be such that the value obtained from the property before and after a lossy compression does not change by a significant amount, and the change should be bounded. The property should be such that a property value as obtained from the image will not vary due to compression, but only due to malicious tampering. The value obtained from the property is stored so that the image can be verified. The complete image is considered in deciding whether to increase or decrease the property value in a particular region. The method also takes into account the fact that blocks having values of 0 or L, corresponding to the minimum and maximum property values, respectively, are incapable of change in a particular region. The method also attempts to vary even the checksum (stored information), in addition to modifying the image so that the net resultant checksum and the modified image coincide with each other.
    • 一种用于在预先指定的上限值的约束下数字嵌入数字图像的方法,该方法是与图像相关联的属性的值的变化量。 对于隐藏在数字图像中的压缩容忍数据,选择可以嵌入所需信息的属性。 财产应该是从有损压缩之前和之后的财产获得的价值不会有大量的变化,变化应该是有限的。 属性应该使得从图像获得的属性值不会因压缩而变化,而只是由于恶意篡改。 存储从属性获得的值,以便可以验证图像。 在决定是否增加或减少特定区域中的属性值时考虑完整的图像。 该方法还考虑到具有对应于最小和最大属性值的值为0或L的块在特定区域中不能改变的事实。 除了修改图像之外,该方法还尝试改变校验和(存储的信息),使得净结果校验和和修改的图像彼此一致。
    • 8. 发明授权
    • Compression-tolerant watermarking scheme for image authentication
    • 图像认证的压缩容忍水印方案
    • US06246777B1
    • 2001-06-12
    • US09273055
    • 1999-03-19
    • Saurabh AgarwalAlok AggarwalHarpal Singh BassaliJatin ChhuganiPradeep Kumar Dubey
    • Saurabh AgarwalAlok AggarwalHarpal Singh BassaliJatin ChhuganiPradeep Kumar Dubey
    • G06K900
    • G06T1/0057G06T2201/0051
    • A verification system for still images that embeds a watermark so that no visual artifacts are created in the images and thus maintains the visual quality of the image. The algorithm embeds information in an uncompressed image so as to later detect the alteration of the image, as well as the location of the alteration. The embedding of information into a source image is based on a defined mapping process. An image plane consists of macroblocks, which are themselves comprised of microblocks. A code is embedded corresponding to the value of this image property in each macroblock. The specific sequence of microblocks used for embedding this information in the watermarking image plane is a unique function of this property for the corresponding set of microblocks in the indexing image plane. This information can be later decoded from the stamped image. The watermark is embedded by combining the pixel values of the image with the watermark. The watermark is altered if the image is altered.
    • 用于嵌入水印的静止图像的验证系统,使得在图像中不产生视觉伪影,从而保持图像的视觉质量。 该算法将信息嵌入到未压缩图像中,以便稍后检测图像的改变以及改变的位置。 将信息嵌入到源图像中是基于定义的映射过程。 图像平面由宏块组成,宏块本身由微块组成。 在每个宏块中嵌入与该图像属性的值相对应的代码。 用于将该信息嵌入水印图像平面中的微块的特定序列是该索引图像平面中相应的微块集合的该属性的唯一函数。 该信息可以稍后从加盖的图像中解码。 通过将图像的像素值与水印相结合来嵌入水印。 如果图像被改变,则改变水印。
    • 9. 发明授权
    • Mechanism for facilitating customized data overriding for software programs in an on-demand services environment
    • 在按需服务环境中促进定制数据覆盖软件程序的机制
    • US08869114B2
    • 2014-10-21
    • US13299176
    • 2011-11-17
    • Saurabh Agarwal
    • Saurabh Agarwal
    • G06F9/44G06F9/445G06F11/36
    • G06F11/3672G06F8/65
    • In accordance with embodiments, there are provided mechanisms and methods for facilitating customized overriding of data for maintenance of software applications in an on-demand services environment. In one embodiment and by way of example, a method includes duplicating first data of a first data set into a second data that is placed in a second data set. The first data relates to a software application at a computing device. The method may further include amending a portion of the second data at the second data set. The amended portion of the second data corresponds to an unchanged portion of the first data. The method may further include facilitating running of the software application based on the first data while referring to the amended portion of the second data and ignoring the corresponding unchanged portion of the first data.
    • 根据实施例,提供了用于在按需服务环境中促进用于维护软件应用的数据的自定义覆盖的机制和方法。 在一个实施例中,作为示例,一种方法包括将第一数据集的第一数据复制到放置在第二数据集中的第二数据中。 第一数据涉及计算设备处的软件应用。 该方法还可以包括在第二数据集中修改第二数据的一部分。 第二数据的修改部分对应于第一数据的不变部分。 该方法还可以包括在参考第二数据的修改部分的同时基于第一数据促进软件应用的运行,并且忽略第一数据的对应的未改变部分。
    • 10. 发明授权
    • Network distribution prevention when virtual chassis system undergoes splits and merges
    • 虚拟机箱系统经历分割和合并时的网络分布预防
    • US08369211B2
    • 2013-02-05
    • US12640667
    • 2009-12-17
    • Saurabh AgarwalRajashekar ReddyHarshad NakilMegh Bhatt
    • Saurabh AgarwalRajashekar ReddyHarshad NakilMegh Bhatt
    • G01R31/08
    • G06F11/2002H04L41/0677H04L41/0893H04L69/40
    • A method performed by network devices that includes operating in a normal mode, where the network devices form a virtual chassis that corresponds to a single logical network device; detecting when a failure within the virtual chassis occurs; executing a splitting process to form one or more new virtual chassis in correspondence to the failure; determining whether one of the one or more new virtual chassis operates as a functioning virtual chassis based on whether at least one of a set of criteria is satisfied, where the functioning virtual chassis operates according to resources configured for the virtual chassis; and operating as a nonfunctioning virtual chassis when it is determined that the one of the one or more virtual chassis does not satisfy the at least one of the set of criteria, where the nonfunctioning virtual chassis operates in a pass-through mode.
    • 网络设备执行的方法,其包括以正常模式操作,其中网络设备形成对应于单个逻辑网络设备的虚拟机箱; 检测虚拟机箱内的故障发生时间; 执行拆分过程以形成与故障相对应的一个或多个新的虚拟底盘; 基于是否满足一组标准中的至少一个来确定所述一个或多个新的虚拟机架中的一个虚拟机是否起作为功能的虚拟机架的作用,其中所述功能性虚拟机架根据为所述虚拟机架配置的资源而运行; 并且当确定所述一个或多个虚拟机箱中的一个不满足所述一组标准中的至少一个时,其中所述不起作用的虚拟机箱以直通模式操作。