Vehicle bumper beam having non-uniform cross sections
    132.
    发明授权
    Vehicle bumper beam having non-uniform cross sections 失效
    车辆缓冲梁具有不均匀的横截面

    公开(公告)号:US07163241B2

    公开(公告)日:2007-01-16

    申请号:US10875264

    申请日:2004-06-25

    CPC classification number: B60R19/18 B60R2019/1826

    Abstract: A bumper for a vehicle comprises a hollow tubular beam, and has two side rail mounting portions and a front impact portion disposed between and formed continuously with the side rail mounting portions. The front impact portion includes an initial impact region and two additional deforming regions, with the initial impact region being disposed between the additional deforming regions. The initial impact region has top and bottom surfaces that are generally flat and the additional deforming regions each have top and bottom surfaces that are generally convex.

    Abstract translation: 车辆的保险杠包括中空管状梁,并且具有两个侧轨安装部分和设置在侧轨安装部分之间并与侧轨安装部分连续形成的前冲击部分。 前冲击部分包括初始冲击区域和两个附加变形区域,初始冲击区域设置在附加变形区域之间。 初始冲击区域具有通常为平坦的顶表面和底表面,并且附加变形区域各自具有通常为凸面的顶表面和底表面。

    Threat protection network
    133.
    发明申请
    Threat protection network 失效
    威胁网络

    公开(公告)号:US20060075504A1

    公开(公告)日:2006-04-06

    申请号:US11234531

    申请日:2005-09-22

    Applicant: Bing Liu

    Inventor: Bing Liu

    Abstract: Threat protection networks are described. Embodiments of threat protection network in accordance with the invention use expert systems to determine the nature of potential threats to a remote computer. In several embodiments, a secure peer-to-peer network is used to rapidly distribute information concerning the nature of the potential threat through the threat protection network. One embodiment of the invention includes at least one client computer connected to a network, a server that stores threat definition data and is connected to the network, an expert system in communication with the server. In addition, the client computer is configured to refer potential threats to the server, the server is configured to refer to the expert system any potential threat forwarded by a client computer that is not identified in the threat definition data and the expert system is configured to determine whether the potential threat is an actual threat by exposing at least one test computer to the potential threat and observing the behavior of the test computer.

    Abstract translation: 描述了威胁网络。 根据本发明的威胁防护网络的实施例使用专家系统来确定对远程计算机的潜在威胁的性质。 在几个实施例中,使用安全对等网络来通过威胁防护网络快速分发关于潜在威胁的性质的信息。 本发明的一个实施例包括连接到网络的至少一个客户端计算机,存储威胁定义数据并连接到网络的服务器,与服务器通信的专家系统。 此外,客户端计算机被配置为将潜在威胁引用到服务器,服务器被配置为引用专家系统由客户端计算机转发的任何未在威胁定义数据中标识的潜在威胁,而专家系统被配置为 通过将至少一台测试计算机暴露于潜在威胁并观察测试计算机的行为来确定潜在威胁是否是实际的威胁。

    Method and software products for continued application execution after
generation of fatal exceptions
    134.
    发明授权
    Method and software products for continued application execution after generation of fatal exceptions 失效
    生成致命异常后继续执行应用程序的方法和软件产品

    公开(公告)号:US5815702A

    公开(公告)日:1998-09-29

    申请号:US686250

    申请日:1996-07-24

    CPC classification number: G06F9/4812 G06F9/542

    Abstract: A method of operating a computer and a software product, enable a computer system and application to continue execution after the application has generated a fatal exception. This allows the user to save any data file that was being used at the time the fatal exception was generated, and thereby not lose that data that would have otherwise been lost by the operating system spontaneously terminating the application because of the fatal exception. The method involves receiving a notification that the application has generated an exception, notifying the operating system that the exception has been handled, so as to "fool" the operating system and prevent it from spontaneously terminating the application, and then to enable the application to continue operating so that the user can save any unsaved data by executing a continuous loop of code in place of the main message loop of the faulting application. The continuous loop receives messages and events for the application and passes them to the proper executable components of the application. The software product includes an exception handler that receives notification from the operating system of the fatal exception, a background process that is notified by the exception handler of this occurrence and that prompts the user with an option to terminate or continue the application, and a continuous loop of code instructions that replaces a message loop of the application, thereby enabling it to continue execution.

    Abstract translation: 一种操作计算机和软件产品的方法,使计算机系统和应用程序在应用程序产生致命异常之后继续执行。 这允许用户保存在生成​​致命异常时正在使用的任何数据文件,从而不会丢失由于致命的异常而由操作系统自发地终止应用程序而丢失的数据。 该方法包括接收应用程序产生异常的通知,通知操作系统异常已被处理,以便“愚弄”操作系统并阻止其自动终止应用程序,然后使应用程序 继续操作,以便用户可以通过执行连续的代码循环代替故障应用程序的主消息循环来保存任何未保存的数据。 连续循环接收应用程序的消息和事件,并将其传递给应用程序的正确的可执行组件。 软件产品包括异常处理程序,该异常处理程序从操作系统接收致命异常的通知,由异常处理程序通知此事件的后台进程,并提示用户终止或继续应用程序的选项,以及连续的 循环的代码指令替代应用程序的消息循环,从而使其能够继续执行。

Patent Agency Ranking