Настройки

Укажите год
-

Небесная энциклопедия

Космические корабли и станции, автоматические КА и методы их проектирования, бортовые комплексы управления, системы и средства жизнеобеспечения, особенности технологии производства ракетно-космических систем

Подробнее
-

Мониторинг СМИ

Мониторинг СМИ и социальных сетей. Сканирование интернета, новостных сайтов, специализированных контентных площадок на базе мессенджеров. Гибкие настройки фильтров и первоначальных источников.

Подробнее

Форма поиска

Поддерживает ввод нескольких поисковых фраз (по одной на строку). При поиске обеспечивает поддержку морфологии русского и английского языка
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Ведите корректный номера.
Укажите год
Укажите год

Применить Всего найдено 53. Отображено 53.
21-02-2012 дата публикации

Approach for managing the consumption of resources using adaptive random sampling

Номер: US0008121043B2

An approach for managing the consumption of resources uses adaptive random sampling to decrease the collection of flow statistical data as the consumption of resources increases. When a packet is received from a network, a determination is made whether the packet belongs to an existing flow, for which flow statistical data is being collected, or to a new flow. If the packet belongs to an existing flow, then the flow statistical data for the existing flow is updated to reflect the packet. If the packet belongs to the new flow, then a sampling probability is used to determine whether the new flow is to be sampled. The sampling probability is determined, at least in part, upon a current usage of resources.

Подробнее
11-01-2007 дата публикации

Offload stack for network, block and file input and output

Номер: US20070011272A1
Принадлежит:

An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.

Подробнее
06-03-2012 дата публикации

Network context triggers for activating virtualized computer applications

Номер: US0008127412B2

A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program ...

Подробнее
10-04-2012 дата публикации

Offload stack for network, block and file input and output

Номер: US0008156230B2

An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.

Подробнее
24-05-2011 дата публикации

Offload stack for network, block and file input and output

Номер: US0007949766B2

An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.

Подробнее
22-02-2007 дата публикации

Approach for managing the consumption of resources using adaptive random sampling

Номер: US20070041331A1
Принадлежит: Cisco Technology Inc

An approach for managing the consumption of resources uses adaptive random sampling to decrease the collection of flow statistical data as the consumption of resources increases. When a packet is received from a network, a determination is made whether the packet belongs to an existing flow, for which flow statistical data is being collected, or to a new flow. If the packet belongs to an existing flow, then the flow statistical data for the existing flow is updated to reflect the packet. If the packet belongs to the new flow, then a sampling probability is used to determine whether the new flow is to be sampled. The sampling probability is determined, at least in part, upon a current usage of resources.

Подробнее
07-08-2003 дата публикации

Method and system for securely storing and trasmitting data by applying a one-time pad

Номер: US20030149869A1
Автор: Paul Gleichauf
Принадлежит:

An approach for securely transmitting and storing data is described. A sending host generates a truly random sequence of characters as a keystream that may serve as a one-time pad. The keystream is bitwise combined with plaintext using an exclusive-OR operation to result in creating ciphertext. The keystream and ciphertext are routed over physically separate communication paths to a receiving host. The receiving host decrypts the ciphertext by applying the keystream to the ciphertext using bitwise exclusive-OR. The separately routed paths may be established using MPLS labeling or strict route options. The keystream may be pre-computed and sent to the receiving host asynchronously for caching at the receiving host; the receiving host may then replace cached keystream with recovered plaintext as the ciphertext is decrypted, thereby achieving savings in storage. Security of the system lies in the truly random nature of the keystream and the use of physically separate routing paths for keystream ...

Подробнее
26-11-2013 дата публикации

Dynamic authenticated perimeter defense

Номер: US0008595817B2

Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while also efficiently spreading security functions among network elements and systems. In one technique, a network element comprises security function modules. Systems toward which the network element forwards data packets also comprise security function modules. A particular security function module on the network element begins in a state of deactivation. The network element determines whether a corresponding security function module on one of the systems is functioning in a satisfactory manner. If not, then the network element activates the particular security function module. While activated, the particular security function module may perform at least some of the security function operations that the corresponding security function module would have performed if the corresponding security function module was satisfactory.

Подробнее
14-07-2011 дата публикации

OFFLOAD STACK FOR NETWORK, BLOCK AND FILE INPUT AND OUTPUT

Номер: US20110173295A1
Принадлежит:

An apparatus for offloading network, block and file functions from an operating system comprises a network interface coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer-readable medium carrying one or more operating systems and an input/output networking stack which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems. The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces, and permitting data to be transferred between the internal interfaces and a plurality of external interfaces by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.

Подробнее
28-09-2006 дата публикации

Policy-based approach for managing the export of network flow statistical data

Номер: US20060217923A1
Принадлежит: Cisco Technology Inc

A policy-based approach for managing the export of network flow statistical data uses constraints and prioritization to select flow data to be exported by flow monitoring processes. According to the approach, a flow monitoring process monitors a plurality of flows at an observation point. The flow monitoring process generates flow statistical data for the plurality of flows. Policy data is made available to the flow monitoring process and includes constraint data and priority data. The constraint data indicates usage constraints for one or more resources available to the flow monitoring process. The priority data indicates a desired priority of flow attributes. The flow monitoring process uses the policy data to select one or more flows from the plurality of flows, such that the resource usage constraints are satisfied. The flow monitoring process exports a portion of the flow statistical data that corresponds to the selected one or more flows.

Подробнее
07-10-2010 дата публикации

Dynamic authenticated perimeter defense

Номер: US20100257599A1
Принадлежит:

Techniques for dynamically configuring security mechanisms in a network can construct security perimeters that satisfy security needs at any given time while also efficiently spreading security functions among network elements and systems. In one technique, a network element comprises security function modules. Systems toward which the network element forwards data packets also comprise security function modules. A particular security function module on the network element begins in a state of deactivation. The network element determines whether a corresponding security function module on one of the systems is functioning in a satisfactory manner. If not, then the network element activates the particular security function module. While activated, the particular security function module may perform at least some of the security function operations that the corresponding security function module would have performed if the corresponding security function module was satisfactory.

Подробнее
17-05-2007 дата публикации

Method and system for extending access to a product

Номер: US20070112683A1
Автор: Paul Gleichauf
Принадлежит: Cisco Technology, Inc.

A method and system for managing payment for a license for a licensed product is provided. The method includes the use of regulations to enforce payment for the license that is issued to a client. The license is issued to the client by a license manager. The license manager informs the client if payment for the license is due. The client is instructed to make payment for the license by including payment for license in auditing functions of an auditor. Thereafter, the access expiration date of the licensed product is extended. The auditing functions include verification of the compliance of the client with the regulations. Thereafter, the client makes payment for the license.

Подробнее
02-10-2008 дата публикации

Network context triggers for activating virtualized computer applications

Номер: US20080244747A1
Принадлежит:

A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program ...

Подробнее
24-05-2012 дата публикации

INCREMENTAL AND BULK STORAGE SYSTEM

Номер: US20120131352A1
Автор: Gleichauf Paul H.
Принадлежит: Apple Inc.

A method for storing electronic data. A first set of electronic data may be copied from a computing device to a capsule. The capsule then may be transferred or located to a location other than that of the computing device. The capsule and the computing device may be in electronic communication. The first set of electronic data may be updated on the capsule when changes are made to the first set of electronic data on the computing device. 1. A method for storing electronic data , comprising:classifying a first set of electronic data as one of a set of data types;initiating copying, at a first location, of the first set of electronic data from a computing device to a portable device when the computing device and first portable device are physically connected;determining that at least a portion of the first set of electronic data has changed, thereby resulting in a changed data set;creating at least one update based on the at least a portion of the first set of electronic data that has changed; andelectronically transmitting the at least one update from the computing device to the first portable device when the first portable device is in a second location.2. The method of further comprising:partitioning the first capsule into a first portion and a second portion; andtransferring a second set of electronic data to the first capsule, wherein the first set of electronic data is stored in the first portion and a second set of electronic data is stored in the second portion.3. The method of further comprising updating a copy of the second set of electronic data on the first capsule in response to changes to the second set of electronic data.4. The method of claim 1 , wherein the first set of data types comprises:first data to be access controlled for storage on the capsule;second data to be encrypted for storage on the capsule; andthird data that initiates storage of a reference link to a content provider of the third data; whereinthird data Is not stored on the capsule.5. ...

Подробнее
02-01-2020 дата публикации

Blockchain infrastructure for securing and/or managing electronic artifacts

Номер: US20200007513A1
Автор: Paul Harry Gleichauf
Принадлежит: ARM IP LTD

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, to facilitate and/or support one or more operations and/or techniques for blockchain infrastructure for securing and/or managing electronic artifacts, such as implemented in connection with one or more computing and/or communication networks and/or protocols.

Подробнее
19-04-2018 дата публикации

BLOCKCHAIN MINING USING TRUSTED NODES

Номер: US20180109541A1
Автор: Gleichauf Paul Harry
Принадлежит:

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more mobile communication devices and/or processing devices to facilitate and/or support one or more operations and/or techniques for blockchain mining using trusted nodes, such as via democratization of associated resources for fair blockchain mining, for example. 1. A method comprising:communicating electronically with a plurality of nodes on a network regarding a validation of a block of on-line transactions for a blockchain, at least some of the plurality of nodes comprising at least one of the following: a full node; a lightweight node; or any combination thereof,one or more communications of the communicating electronically occurring, at least in part, through use of trusted computational capabilities of the at least some of the plurality of nodes.2. The method of claim 1 , wherein the trusted computational capabilities are determined claim 1 , at least in part claim 1 , via at least one of the following: an International Mobile Subscriber Identity (IMSI) of the at least some of the plurality of nodes; an Integrated Circuit Card Identity (ICCID) of the at least some of the plurality of nodes; an International Mobile Equipment Identity (IMEI) of the at least some of the plurality of nodes claim 1 , or a Mobile Station Integrated Services for Digital Network number (MSISDN) of the at least some of the plurality of nodes; or any combination thereof.3. The method of claim 1 , wherein the at least some of the plurality of nodes comprise mining nodes.4. The method of claim 1 , wherein the mining nodes comprise mobile devices associated with a mobile service provider (MSP).5. The method of claim 4 , wherein the validation of the block of on-line transactions is implemented substantially during an idle cycle of a processing unit of the mobile devices.6. The method of claim 4 , wherein the mobile devices comprise one or more ...

Подробнее
26-04-2018 дата публикации

Apparatus and methods for increasing security at edge nodes

Номер: US20180115522A1
Автор: Paul Harry Gleichauf
Принадлежит: ARM IP LTD

A machine implemented method for protecting at least one edge node in a network of nodes is provided. The method comprising: communicatively coupling said at least one edge node with a proxy node; providing an application for said at least one edge node in an isolated area associated with said at least one edge node at said proxy node; determining that an update for said at least one edge node is required; increasing a reboot frequency of said at least one edge node following said determination that an update is required; and increasing a reboot frequency of said proxy node following said determination that an update is required.

Подробнее
28-08-2014 дата публикации

WIRELESS LOCATION OPTIMIZATION

Номер: US20140242961A1
Принадлежит: Apple Inc.

Systems and methods are provided for configuring settings of a mobile device based on an inferred location. The mobile device can use stored indicia of trip (e.g., an electronic ticket or itinerary) to identify origination and destination locations. The start and end of the trip can be inferred based on changes in operation of the mobile device. For instance, if the user is on an airplane, the user may turn off network connectivity at the origination location just prior to takeoff, and may turn the network connectivity back on upon landing at the destination location. If the time that elapsed between the changes in operation is consistent with the duration of the trip indicated by the stored indicia, the mobile device can infer that the current location is the destination location. The mobile device can then configure location-specific settings in accordance with the destination location to establish a network connection. 1. A method for configuring one or more settings of a mobile device of a user based on an inferred location , the method comprising:analyzing, with the mobile device, data stored in a storage of the mobile device to identify indicia of an origination location and a destination location of a trip by the user;inferring a start of the trip at the origination location based on a first change in operation of the mobile device, wherein the mobile device includes a network interface, and wherein the first change in operation involves a change in connectivity at the network interface;inferring an end of the trip at the destination location based on a second change in operation of the mobile device;after inferring the end of the trip, identifying the destination location as a current location of the mobile device;configuring the one or more settings of the mobile device based on the identified current location; andusing the one or more configured settings to establish a network connection.2. The method of claim 1 , wherein the indicia is included in one or ...

Подробнее
22-09-2022 дата публикации

THREE-DIMENSIONAL DEVICE COOLING

Номер: US20220301978A1
Автор: Gleichauf Paul Harry
Принадлежит:

Subject matter disclosed herein may relate to devices and techniques for cooling three-dimensional integrated circuit (IC) devices. In particular embodiments, an IC device may comprise a three-dimensional structure having a first surface adapted to face a mounting surface and a second surface opposite the first surface, and having one or more cavities to extend at least below the second surface. 1. An integrated circuit device comprising:a three-dimensional structure to comprise a first surface adapted to face a mounting surface and a second surface opposite the first surface, the three-dimensional structure further to comprise one or more cavities to extend between the first surface and the second surface to discharge heat from the second surface.2. The integrated circuit device of claim 1 , wherein the three-dimensional structure further comprises two or more circuit layers disposed between the first and second surfaces claim 1 , and wherein at least one of the one or more cavities further to extend through at least two of the two or more circuit layers.3. The integrated circuit device of claim 1 , and further comprising a cold reservoir disposed in contact with the mounting surface and/or first surface to enable active cooling of the three-dimensional structure claim 1 , and wherein at least one of the one or more cavities to draw cooler air into the integrated circuit device and discharge warmer air from the integrated circuit device.4. The integrated circuit device of claim 1 , and further comprising one or more branch channels coupling at least one of the one or more cavities to a lateral surface of the three-dimensional structure.5. The integrated circuit device of claim 4 , wherein the one or more cavities and the one or more branch channels are positioned couple an airflow external to the three-dimensional structure and an expected airflow internal to the three-dimensional structure.6. The integrated circuit device of claim 5 , wherein the one or more ...

Подробнее
03-10-2019 дата публикации

BLOCKCHAIN MINING USING TRUSTED NODES

Номер: US20190306176A1
Автор: Gleichauf Paul Harry
Принадлежит:

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more mobile communication devices and/or processing devices to facilitate and/or support one or more operations and/or techniques for blockchain mining using trusted nodes, such as via democratization of associated resources for fair blockchain mining, for example. 1. A method comprising:communicating electronically with a plurality of nodes on a network regarding a validation of a block of on-line transactions for a blockchain, at least some of the plurality of nodes comprising at least one of the following: a full node; a lightweight node; or any combination thereof,one or more communications of the communicating electronically occurring, at least in part, through use of trusted computational capabilities of the at least some of the plurality of nodes.2. The method of claim 1 , wherein the trusted computational capabilities are determined claim 1 , at least in part claim 1 , via at least one of the following: an International Mobile Subscriber Identity (IMSI) of the at least some of the plurality of nodes; an Integrated Circuit Card Identity (ICCID) of the at least some of the plurality of nodes; an International Mobile Equipment Identity (IMEI) of the at least some of the plurality of nodes claim 1 , or a Mobile Station Integrated Services for Digital Network number (MSISDN) of the at least some of the plurality of nodes; or any combination thereof.3. The method of claim 1 , wherein the at least some of the plurality of nodes comprise mining nodes.4. The method of claim 1 , wherein the mining nodes comprise mobile devices associated with a mobile service provider (MSP).5. The method of claim 4 , wherein the validation of the block of on-line transactions is implemented substantially during an idle cycle of a processing unit of the mobile devices.6. The method of claim 4 , wherein the mobile devices comprise one or more ...

Подробнее
22-11-2018 дата публикации

BLOCKCHAIN FOR SECURING AND/OR MANAGING IOT NETWORK-TYPE INFRASTRUCTURE

Номер: US20180337769A1
Автор: Gleichauf Paul Harry
Принадлежит:

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more Internet of Things devices to facilitate and/or support one or more operations and/or techniques for a blockchain for securing and/or managing IoT network-type infrastructure, such as implemented in connection with one or more computing and/or communication networks and/or protocols. 1. A method comprising:communicating electronically regarding one or more electronic transactions of one or more devices on a network, at least some of said one or more devices comprising at least one of the following: a sensor; an actuator; a middlebox; or any combination thereof,said one or more electronic transactions occurring substantially in accordance with one or more consensus rules of a blockchain through use of an integrated cost metric.2. The method of claim 1 , wherein said one or more electronic transactions comprises at least one of the following: an authentication-related transaction; an authorization-related transaction; a resource allocation-related transaction; a delegation-related transaction; a peer anomaly detection-related transaction; a dynamic pricing-related transaction; a miner reward-related transaction; or any combination thereof.3. The method of claim 1 , wherein said one or more electronic transactions further occurring substantially in accordance with one or more restrictions.4. The method of claim 3 , wherein said one or more restrictions comprise at least one of the following: a smart contract-related restriction; a digital currency budget-related restriction; or any combination thereof.5. The method of claim 1 , wherein said one or more consensus rules comprises at least one of the following: a two-party consensus rule; a proof-of-work-type consensus rule; a proof-of-stake-type consensus rule; an algorithmically-determined-randomly-chosen verifiers rule; or any combination thereof.6. The method of claim 1 , ...

Подробнее
21-11-2019 дата публикации

APPARATUS AND METHODS FOR INCREASING SECURITY AT EDGE NODES

Номер: US20190356637A1
Автор: Gleichauf Paul Harry
Принадлежит:

A proxy node protects at least one edge node in a network of nodes. The proxy node includes a communications module for communicatively coupling the proxy node with the edge node so that all communications to and from that edge node go through the proxy node. The proxy node also has at least one isolated area that is associated with the at least one edge node. The isolated area stores application software for the associated edge node. 1. A proxy node for protecting at least one edge node in a network of nodes , the proxy node comprising: 'at least one isolated area, said at least one isolated area associated with said at least one edge node and configured to store said associated edge nodes application software.', 'a communications module for communicatively coupling said proxy node with said at least one edge node, such that all communications to and from said at least one edge node go through said proxy node; and'}2. The proxy node of claim 1 , wherein said proxy node comprises a plurality of isolated areas claim 1 , each isolated area associated with one or more of said at least one edge nodes of the same type.3. The proxy node of claim 1 , wherein said at least one isolated area for said at least one edge node is linked to a communications module provided at said at least one edge node. This application is a divisional of U.S. application Ser. No. 15/333,493, filed Oct. 25, 2016, the entire contents of which are hereby incorporated by reference in this application.The present techniques relate to apparatus and methods for increasing security at simple Internet of Things devices. More particularly, the techniques relate to increasing security at simple Internet of Things devices through a combination of a proxy node and defensive secure reboots.It is known that simple Internet of Things (IoT) devices do not have the capabilities to provide complex security functions, and as a result there are widespread concerns that the Internet of Things will be hamstrung by ...

Подробнее
14-08-2003 дата публикации

Method and system for securely storing and transmitting data by applying a one-time pad

Номер: CA2466704A1
Автор: Paul Gleichauf
Принадлежит: Individual

An approach for securely transmitting and storing data is described. A sendi ng host generates a random sequence of characters as a keystream as a one-time pad. The keystream is bitwise combined with plaintext using an exclusive-OR operation to create ciphertext. The keystream and ciphertext are routed over physically separate communication paths to a receiving host, which decrypts by applying the keystream to the ciphertext using exclusive-OR. The separately routed paths may be established using MPLS labeling or strict route options.

Подробнее
02-11-2010 дата публикации

Method and system for securely storing and transmitting data by applying a one-time pad

Номер: CA2466704C
Автор: Paul Gleichauf
Принадлежит: Cisco Technology Inc

An approach for securely transmitting and storing data is described. A sending host generates a random sequence of characters as a keystream as a one-time pad. The keystream is bitwise combined with plaintext using an exclusive-OR operation to create ciphertext. The keystream and ciphertext are routed over physically separate communication paths to a receiving host, which decrypts by applying the keystream to the ciphertext using exclusive-OR. The separately routed paths may be established using MPLS labeling or strict route options.

Подробнее
28-11-2006 дата публикации

Policy-based approach for managing the export of network flow statistical data

Номер: US7143006B2
Принадлежит: Cisco Technology Inc

A policy-based approach for managing the export of network flow statistical data uses constraints and prioritization to select flow data to be exported by flow monitoring processes. According to the approach, a flow monitoring process monitors a plurality of flows at an observation point. The flow monitoring process generates flow statistical data for the plurality of flows. Policy data is made available to the flow monitoring process and includes constraint data and priority data. The constraint data indicates usage constraints for one or more resources available to the flow monitoring process. The priority data indicates a desired priority of flow attributes. The flow monitoring process uses the policy data to select one or more flows from the plurality of flows, such that the resource usage constraints are satisfied. The flow monitoring process exports a portion of the flow statistical data that corresponds to the selected one or more flows.

Подробнее
05-04-2007 дата публикации

Offload stack for network, block and file input and output

Номер: WO2007002710B1

An apparatus for offloading network, block and file functions from an operating system comprises a network interface (118A,118B) coupled to a network for receiving packet flows; one or more processors each having one or more processor cores; a computer- readable medium carrying one or more operating systems and an input/output networking stack (110) which are hosted in one or more of the processor cores. The networking stack is shared among the operating systems (104A,104B). The networking stack comprises instructions which when executed cause receiving a request for data transfer from one of the operating systems at internal network, block and file system interfaces (112,114,116), and permitting data to be transferred between the internal interfaces and a plurality of external interfaces (118A-118D) by preventing the operating systems from performing the data transfer and performing the data transfer on behalf of the operating systems.

Подробнее
02-09-2003 дата публикации

Method and system for securely storing and transmitting data by applying a one-time pad

Номер: AU2003208894A1
Автор: Paul Gleichauf
Принадлежит: Cisco Technology Inc

Подробнее
29-07-2014 дата публикации

Centralized control plane appliance for virtual infrastructure

Номер: CA2732885C
Принадлежит: Cisco Technology Inc

In a virtual infrastructure, a single appliance (12, 36) is provided that hosts a centralized virtual machine monitor (VMM) control plane (34) to effectively establish a single virtual switch across all virtual machines (18) within one or more clusters of servers (12), thereby reducing the number of management points for the network administrator and facilitating easier VM migration.

Подробнее
17-03-1964 дата публикации

High resolution electron discharge device

Номер: CA682302A
Автор: H. Gleichauf Paul
Принадлежит: General Electric Co

Подробнее
17-07-1962 дата публикации

High resolution electron discharge device

Номер: US3045140A
Автор: Paul H Gleichauf
Принадлежит: General Electric Co

Подробнее
02-03-1965 дата публикации

High transconductance cathode ray tube

Номер: CA704633A
Автор: H. Gleichauf Paul
Принадлежит: General Electric Co

Подробнее
09-10-2008 дата публикации

Method and system for securely storing and transmitting data by applying a one-time pad

Номер: AU2003208894B2
Автор: Paul Gleichauf
Принадлежит: Cisco Technology Inc

An approach for securely transmitting and storing data is described. A sending host generates a random sequence of characters as a keystream as a one-time pad. The keystream is bitwise combined with plaintext using an exclusive-OR operation to create ciphertext. The keystream and ciphertext are routed over physically separate communication paths to a receiving host, which decrypts by applying the keystream to the ciphertext using exclusive-OR, The separately routed paths may be established using MPLS labeling or strict route options.

Подробнее
05-03-2024 дата публикации

Blockchain for securing and/or managing IoT network-type infrastructure

Номер: US11924322B2
Автор: Paul Harry Gleichauf
Принадлежит: ARM LTD

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more Internet of Things devices to facilitate and/or support one or more operations and/or techniques for a blockchain for securing and/or managing IoT network-type infrastructure, such as implemented in connection with one or more computing and/or communication networks and/or protocols.

Подробнее
02-01-2020 дата публикации

Blockchain infrastructure for securing and/or managing electronic artifacts

Номер: WO2020002889A1
Автор: Paul Harry Gleichauf
Принадлежит: Arm IP Limited

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, to facilitate and/or support one or more operations and/or techniques for blockchain infrastructure for securing and/or managing electronic artifacts, such as implemented in connection with one or more computing and/or communication networks and/or protocols.

Подробнее
15-02-2012 дата публикации

Offload-stack für netzwerk, block- und dateieingabe und -ausgabe

Номер: ATE542178T1
Принадлежит: Cisco Tech Inc

Подробнее
15-07-2008 дата публикации

Verfahren und system zum sicheren speichern und übertragen von daten bei der benutzung eines one- time pads

Номер: ATE399406T1
Автор: Paul Gleichauf
Принадлежит: Cisco Tech Inc

Подробнее
04-09-2014 дата публикации

Wireless location optimization

Номер: WO2014133740A1
Принадлежит: Apple Inc.

Systems and methods are provided for configuring settings of a mobile device based on an inferred location. The mobile device can use stored indicia of trip (e.g., an electronic ticket or itinerary) to identify origination and destination locations. The start and end of the trip can be inferred based on changes in operation of the mobile device. For instance, if the user is on an airplane, the user may turn off network connectivity at the origination location just prior to takeoff, and may turn the network connectivity back on upon landing at the destination location. If the time that elapsed between the changes in operation is consistent with the duration of the trip indicated by the stored indicia, the mobile device can infer that the current location is the destination location. The mobile device can then configure location-specific settings in accordance with the destination location to establish a network connection.

Подробнее
29-08-2023 дата публикации

Three-dimensional device cooling

Номер: US11742260B2
Автор: Paul Harry Gleichauf
Принадлежит: ARM LTD

Subject matter disclosed herein may relate to devices and techniques for cooling three-dimensional integrated circuit (IC) devices. In particular embodiments, an IC device may comprise a three-dimensional structure having a first surface adapted to face a mounting surface and a second surface opposite the first surface, and having one or more cavities to extend at least below the second surface.

Подробнее
25-03-2020 дата публикации

Blockchain for securing and/or managing iot network-type infrastructure

Номер: EP3625982A1
Автор: Paul Harry Gleichauf
Принадлежит: Advanced Risc Machines Ltd, ARM LTD

Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more Internet of Things devices to facilitate and/or support one or more operations and/or techniques for a blockchain for securing and/or managing IoTnetwork-type infrastructure, such as implemented in connection with one or more computing and/or communication networks and/or protocols.

Подробнее
01-05-2024 дата публикации

Blockchain for securing and/or managing iot network-type infrastructure

Номер: EP3625982B1
Автор: Paul Harry Gleichauf
Принадлежит: Advanced Risc Machines Ltd, ARM LTD

Подробнее
04-09-2019 дата публикации

Apparatus and methods for increasing security at edge nodes

Номер: EP3533197A1
Автор: Paul Harry Gleichauf
Принадлежит: ARM IP LTD

A machine implemented method for protecting at least one edge node in a network of nodes is provided. The method comprising : communicatively coupling said at least one edge node with a proxy node; providing an application for said at least one edge node in an isolated area associated with said at least one edge node at said proxy node; determining that an update for said at least one edge node is required; increasing a reboot frequency of said at least one edge node following said determination that an update is required; and increasing a reboot frequency of said proxy node following said determination that an update is required.

Подробнее
08-02-2022 дата публикации

Apparatus and methods for increasing security at an edge node using a proxy node

Номер: US11245671B2
Автор: Paul Harry Gleichauf
Принадлежит: ARM IP LTD

A proxy node protects at least one edge node in a network of nodes. The proxy node includes a communications module for communicatively coupling the proxy node with the edge node so that all communications to and from that edge node go through the proxy node. The proxy node also has at least one isolated area that is associated with the at least one edge node. The isolated area stores application software for the associated edge node.

Подробнее
23-09-2020 дата публикации

Apparatus and methods for increasing security at edge nodes

Номер: EP3533197B1
Автор: Paul Harry Gleichauf
Принадлежит: ARM IP LTD

Подробнее
03-05-2018 дата публикации

Apparatus and methods for increasing security at edge nodes

Номер: WO2018078321A1
Автор: Paul Harry Gleichauf
Принадлежит: Arm IP Limited

A machine implemented method for protecting at least one edge node in a network of nodes is provided. The method comprising : communicatively coupling said at least one edge node with a proxy node; providing an application for said at least one edge node in an isolated area associated with said at least one edge node at said proxy node; determining that an update for said at least one edge node is required; increasing a reboot frequency of said at least one edge node following said determination that an update is required; and increasing a reboot frequency of said proxy node following said determination that an update is required.

Подробнее
19-10-2023 дата публикации

Three-dimensional device cooling

Номер: US20230335462A1
Автор: Paul Harry Gleichauf
Принадлежит: ARM LTD

Subject matter disclosed herein may relate to devices and techniques for cooling three-dimensional integrated circuit (IC) devices. In particular embodiments, an IC device may comprise a three-dimensional structure having a first surface adapted to face a mounting surface and a second surface opposite the first surface, and having one or more cavities to extend at least below the second surface.

Подробнее
01-05-2024 дата публикации

Blockchain for securing and/or managing iot network-type infrastructure

Номер: EP3625982C0
Автор: Paul Harry Gleichauf
Принадлежит: Advanced Risc Machines Ltd, ARM LTD

Подробнее
11-04-1961 дата публикации

Cathode ray tube structure including combined electrostatic and magnetic convergence system

Номер: CA618031A
Автор: H. Gleichauf Paul
Принадлежит: General Electric Co

Подробнее
21-08-2019 дата публикации

Blockchain mining using trusted nodes

Номер: EP3526671A1
Автор: Paul Harry Gleichauf
Принадлежит: Advanced Risc Machines Ltd, ARM LTD

The present techniques generally relate to blockchain infrastructure and, more particularly, to blockchain mining using trusted nodes and methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, using one or more mobile communication devices and/or processing devices to facilitate and/or support one or more operations and/or techniques for blockchain mining using trusted nodes, such as via democratization of associated resources for fair blockchain mining, for example.

Подробнее
17-08-1971 дата публикации

Distortion reduction of character aperture mask in shaped beam tubes

Номер: US3600624A
Автор: Paul H Gleichauf
Принадлежит: Stromberg Datagraphix Inc

A shaped beam cathode-ray tube having an improved characterbearing matrix is disclosed. The character shaping matrix consists of a thin sheet having a plurality of shaped apertures therethrough corresponding to the desired character shapes, grouped in an active character area. The quality of images produced by a tube using such a matrix is improved when a row of similar apertures is added surrounding the active character area. The areas and spacing of these outer apertures is important in achieving optimum distortion reduction.

Подробнее
09-04-1963 дата публикации

Method and means for producing a monochrome picture on a color television picture tube

Номер: CA660912A
Автор: H. Gleichauf Paul
Принадлежит: General Electric Co

Подробнее
01-05-1962 дата публикации

Color tube potential switching between color and monochrome reproduction

Номер: US3032608A
Автор: Paul H Gleichauf
Принадлежит: General Electric Co

Подробнее
09-04-1959 дата публикации

Schaltungsanordnung zur Erzeugung eines Schwarzweissbildes auf einer Farbfernsehbildroehre

Номер: DE1054488B
Автор: Paul Harry Gleichauf
Принадлежит: General Electric Co

Подробнее