Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

237 results about "Unix" patented technology

Unix (/ˈjuːnɪks/; trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

Methods, apparatus and computer programs performing a mutual challenge-response authentication protocol using operating system capabilities

A client-server authentication method for use where a server process has access to a repository storing cipher-protected client passwords. The method includes applying the same cipher function to the client's copy of its password as was previously applied to generate the stored cipher-protected client passwords. This ensures that both the client and server have access to an equivalent cipher-protected client password-providing a shared secret for driving a mutual challenge-response authentication protocol without having to convert the password into cleartext at the server. The invention can be implemented without significant additional software infrastructure in a UNIX environment. Client passwords are typically stored in the UNIX password repository under the protection of the crypt( ) function applied to the combination of the password and a random number (a "salt'). By sending the salt to the client system together with the server's initial challenge of the authentication protocol, a process at the client is able to apply the crypt( ) function to the client password with the same salt such that the client and server have a shared secret for use as, or to generate, a common session key for the authentication.
Owner:IBM CORP

Multiple user computer including anti-concurrent user-class based disjunctive separation of plural hard drive operation

A computer sharing system which adapts a computer's hardware resources to providing virtual dual system operation for several non-concurrent system users. A separate hard disk drive including a full complement of boot, operating system, program and data file software is provided for each of the non-concurrent system users. Access by one system user to another system user's hard disk drive and attendant files is absolutely denied thereby preventing corruption of one user's hard disk dive files by another user's carelessness or malicious intent, or through unique setup adaptation of one user's program files which may otherwise interact with and impose unwanted changes on another's program file's operational performance. Each of the separate hard disk drives may be uniquely formatted to service totally different operating systems, including boot track code, in support of various operating systems including MS-DOS, Windows-NT, OS / 2, Unix and others. By definition, each separate hard disk drive may be a physically distinct hard disk drive unit, or be more economically embodied as several separately utilized media platters driven by a common hard disk drive mechanisim and having user distinctive READ and WRITE channel control for each media platter. The absolute denial of a system user's access to another system user's assigned hard disk drive may be cracked open to an limited extent whereby READ-ONLY access may be permitted. Additionally, a third hard disk drive may be enabled to be shared by one or more system users in any combination of READ-ONLY, and READ and WRITE modes. My objective is to deliver the independent performance which until now was proffered only by two completly separate computers in the economic form of one set of computer hardware offering at least two virtually separate operating systems and sets of supporting software whereby one system user is absolutely blocked from corrupting another system user's uniquely configured software and data files.
Owner:HANGER SOLUTIONS LLC

Method for across-platform monitoring enterprise application system performance

The invention provides a method for realizing the cross-platform performance monitoring of a J2EE architecture enterprise application system, which is a real-time monitoring method with a B / S structure for a J2EE architecture. The method divides the realization of performance monitoring to the application system into three layers: a data acquisition layer, a data processing layer, and a data exhibition layer; an enterprise can define key performance indices (KPI) of the enterprise according to the demand of IT operation and maintenance management of the enterprise; the realization method also internally defines a set of key performance indices which meet the demand of a plurality of enterprises at the same time; a data analysis engine is used to analyze acquired data through the acquisition to needed performance data of the key performance indices, and an analysis result is sent for alarm notification. Most enterprise-level application systems are deployed under the complex environment of various platforms, such as Unix, Windows and linux; and the development of different monitoring softwares aiming at different platforms is a complex and huge job. The data acquisition layer of the method adopts universal interface technology, and can realize the performance monitoring to multi-platform databases and application middlewares.
Owner:INSPUR SOFTWARE CO LTD

Patch management automation tool for unix, aparxml

The present invention provides a common framework to determine if machines are patched and automatically applies patches as required. It provides an automated tool to assess patch levels and apply patches on several different UNIX machine types. Further, it provides a centralized, consistent method of providing patches to multiple roles within an organization while automatically managing large quantities of machines. It can manage multiple security standards, machine classifications, and patch security levels and be customized to interface with existing asset management tools. It evaluates the most suitable patch to satisfy the minimal patch requirements and is an early warning system that will tell a user when the user's machine will go out of compliance. The tool is composed of two parts: a server component and client component. The server collects data reported by client machines and stores it in a database; collects patch, machine and owner data from other databases, including internal databases and vendor web sites; downloads vendor patches to a depot area; and evaluates compliance and generates a list of patches that are missing, applied late, and patches that are satisfied. An overall compliance verdict is calculated for each machine. The server sends the client a list of patches to be installed as needed. The server receives installation status from the client, reports it onto the web, and sends the user email. The client gathers machine data and sends it to server; queries the server to see if patches are needed, and receives a patch list. The client downloads patches from APAR depot; and installs patches and reports status back to the server.
Owner:IBM CORP

Multithreading-based parallel executing method for long transaction

A long transaction is a transaction which contains multiple atomic transactions and is longer in executing time. The serial execution for the atomic transactions not only costs longer executing time for the long transaction but also occupies more system resources and causes the reduction of the running efficiency of the system. The invention discloses a multithreading-based parallel executing method for a long transaction, which comprises the following steps: (1) formally describing the long transaction as an expanding directed graph; (2) cutting LT (Language Transaction) into a plurality of sub-transactions LT capable of being executed in a parallel form and giving a cutting algorithm; (3) deriving a plurality of sub-threads on the basis of POSIX (Portable Operating System Interface of Unix) threading library (or Windows threading API (Application Program Interface)), so as to execute the long transaction in a parallel embedding mode; and (4) running paralleled codes on a multi-core processor (or a multi-CPU (Central Processing Unit) processor). According to the multithreading-based parallel executing method for the long transaction, the executing time for the long transaction is obviously shortened, the executing efficiency for the long transaction is increased, and the method can be applied to the fields, such as SOA (Service Oriented Architecture), service combination, transaction treatment, and the like.
Owner:杭州久碳科技有限公司

Method and system for securely authenticating network access credentials for users

A method is provided to securely authenticate user credentials. The method includes encrypting a user credential with a public key at an access device wherein the public key is part of a public / private key pair suitable for use with an encryption algorithm. The encrypted network user credential is transmitted from the access device to a decryption server where it is decrypted with a private key, the private key being part of the public / private key pair suitable for use with the encryption algorithm. The decrypted user credential is then transmitted from the decryption server to an authentication server for verification. The decryption server typically forms part of a multi-party service access environment including a plurality of access providers, the method including decrypting the user credential of a user proximate an access provider associated with the user credential. The method can be used in legacy protocols such as Point-to-Point protocol (PPP), Password Authentication Protocol (PAP), Challenge-Handshake Authentication Protocol (CHAP), Remote Authentication Dial In User Service (RADIUS) protocol, Terminal Access Controller Access Control System (TACACS) protocol, Lightweight Directory Access Protocol (LDAP), NT Domain authentication protocol, Unix password authentication protocol, HyperText Transfer Protocol (HTTP), HyperText Transfer Protocol over Secure sockets layer (HTTPS), Extended Authentication Protocol (EAP), Transport Layer Security (TLS) protocol, Token Ring protocol and / or Secure Remote Password protocol (SRP).
Owner:CHANNEL IP BV

System and method for exporting a graphical program to a shared library

System and method for enabling a program to call into graphical program code via a shared library. A graphical programming system may export a graphical program to a shared library, such as a Windows Dynamic Link Library (DLL), Unix Shared Library, etc. A program, e.g. a text-based program, may then use the shared library to call into the graphical program. Graphical programs or subprograms may have associated inputs or outputs of various data types. When creating a shared library, a functional interface specifying parameterized versions of these inputs and outputs may be specified, either automatically or interactively. A program may then utilize this functional interface to construct an appropriate call into the shared library. A user interface enabling users to specify the mapping of graphical program inputs and outputs onto parameters of the functional interface is described. Multiple graphical programs or subprograms may be exported to a shared library. The shared library may include an entry point function associated with each graphical program or subprogram. When a program calls into the entry point associated with a particular graphical program, the entry point function may manipulate or copy the parameters passed by the calling program into a representation expected by the graphical program.
Owner:NATIONAL INSTRUMENTS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products