Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

395 results about "Virtual hosting" patented technology

Virtual hosting is a method for hosting multiple domain names (with separate handling of each name) on a single server (or pool of servers). This allows one server to share its resources, such as memory and processor cycles, without requiring all services provided to use the same host name. The term virtual hosting is usually used in reference to web servers but the principles do carry over to other internet services.

System and method for managing virtual servers

A management capability is provided for a virtual computing platform. In one example, this platform allows interconnected physical resources such as processors, memory, network interfaces and storage interfaces to be abstracted and mapped to virtual resources (e.g., virtual mainframes, virtual partitions). Virtual resources contained in a virtual partition can be assembled into virtual servers that execute a guest operating system (e.g., Linux). In one example, the abstraction is unique in that any resource is available to any virtual server regardless of the physical boundaries that separate the resources. For example, any number of physical processors or any amount of physical memory can be used by a virtual server even if these resources span different nodes. A virtual computing platform is provided that allows for the creation, deletion, modification, control (e.g., start, stop, suspend, resume) and status (i.e., events) of the virtual servers which execute on the virtual computing platform and the management capability provides controls for these functions. In a particular example, such a platform allows the number and type of virtual resources consumed by a virtual server to be scaled up or down when the virtual server is running. For instance, an administrator may scale a virtual server manually or may define one or more policies that automatically scale a virtual server. Further, using the management API, a virtual server can monitor itself and can scale itself up or down depending on its need for processing, memory and I / O resources. For example, a virtual server may monitor its CPU utilization and invoke controls through the management API to allocate a new processor for itself when its utilization exceeds a specific threshold. Conversely, a virtual server may scale down its processor count when its utilization falls. Policies can be used to execute one or more management controls. More specifically, a management capability is provided that allows policies to be defined using management object's properties, events and / or method results. A management policy may also incorporate external data (e.g., an external event) in its definition. A policy may be triggered, causing the management server or other computing entity to execute an action. An action may utilize one or more management controls. In addition, an action may access external capabilities such as sending notification e-mail or sending a text message to a telephone paging system. Further, management capability controls may be executed using a discrete transaction referred to as a “job.” A series of management controls may be assembled into a job using one or management interfaces. Errors that occur when a job is executed may cause the job to be rolled back, allowing affected virtual servers to return to their original state.
Owner:ORACLE INT CORP

Octave pulse data method & apparatus

A method for communicating octave pulse signature messages between a wireless virtual transaction terminal and a virtual host system over a wireless telecommunications network that includes a digital traffic channel that transports speech frames and subframes over selected air interface channels, a pulse code modulated circuits that conveys speech frames and subframes through public land mobile networks and publicly switched telecommunications networks. The method comprises compling a communicative message derived from stored conventional alpha numeric characters using conventional human machine interface apparatus, the apparatus may be comprised of personal digital assistant tablet tap screen; generating an octave pulse message at the wireless virtual transaction terminal, the message comprising a plurality of octave pulse resonant signature encoding constructs; and encoding each octave pulse resonant signature with complex harmonic waveforms associated with musical constructs interpreted as musical notation. The method comprises manipulating speech frames and subframes over air interface traffic channels and using pulse code modulated circuits to convey maniupulated speech frames and subframes. Then, a communicative message derived from stored alpha numeric characters is compiled for wireless voice and data communication.
Owner:SYMSTREAM TECH HLDG NO 2 PTY LTD

Vulnerability simulation overload honeypot method

The present invention discloses a vulnerability simulation overload honeypot method which comprises a host computer, a port scanning deception simulating module, a vulnerability scanning deception simulating module, a vulnerability scanning deception simulating module, a vulnerability attach deception simulating module, a data auditing module and a vulnerability utilizing module. When the attach sequence arrives at the simulated honeypot, a simulated honeypot system is used for processing according to the situation. When an attacker executes vulnerability scanning to the virtual host computer, the simulated honeypot responds and processes according to the vulnerability configuration information. Afterwards, these vulnerabilities are used for further attacking. Hereon, the simulated honeypot system transmits the vulnerability attack data flow to a vulnerability honeypot system. The vulnerability utilization attach of the attacker is processed and responded by a vulnerability attack simulating module. Finally, when the attacker successfully obtains the control power through the vulnerability attack, the attack data hereon is transmitted to a physical honeypot module. All attack processes and related data are recorded by a data auditing module for analyzing comprehensively. The method reduces the number of hardware devices in the honeynet and reduces the cost.
Owner:中国人民解放军总参谋部第五十四研究所 +2

Method and system for enabling access of client device to remote desktop

A computer implemented method, computer program product, and systems for enabling access of a client device to a remote desktop. The remote desktop is implemented within a remote virtual machine engine (302) selected from one or more virtual machines running on a virtual host (301). A connection management component receiving from the client device 200 a connection request wherein the connection request is directed to establishing a connection between the client device (200) and the remote virtual machine engine (302). If authorization data associated with the connection request complies with a predefined access data structure and corresponding access rules, the connection management component requests destination data of the remote virtual machine engine (302), the destination data allowing to interact with the virtual machine engine (302) and, in response, receiving the destination data. Then it sends to a proxy service (102) a session request based on the destination data for establishing a session (1010) with the remote virtual machine engine (302) through the proxy service (102) in accordance with the authorization data. It receives from the proxy service (102) proxy connection data configured to allow the client device to establish a proxy connection (1009) via a wide area network (400). The proxy connection data is then sent to the client device (200) to enable the client device (200) for establishing the proxy connection between the client device (200) and the proxy service (102) over the wide area network (400) to access the remote virtual machine engine (302) through the session with the remote virtual machine engine (302).
Owner:TOCARIO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products