摘要:
A method of identifying a cause of an allocation failure in a Java virtual machine is presented. The method includes getting a stack trace of a thread that triggers an allocation failure. In response to the allocation failure that meets specified criteria, including the stack trace in the Verbose garbage collector output resulting from the garbage collection cycle. The method further includes identifying a cause of the allocation failure from the Verbose garbage collector output that includes the stack trace and taking corrective action to avoid repeating the allocation failure.
摘要:
Accessing a digital file from a database which includes the steps of determining a first set of data entry protocols for enabling a user to access i.e. preview at least one portion of the digital file, enabling a user to access the one or more portions by entering the first set of protocols, determining a second set of data entry protocols for enabling a user to access the entire digital file from the database, and enabling a user to access the entire digital file by entering the second set of data entry protocols in response to the user accessing the one portion or some threshold of a predetermined number of such portions.
摘要:
Accessing a digital file from a database that includes the steps of determining a first set of data entry protocols for enabling a user to access, i.e. preview, at least one portion of said digital file, enabling a user to access the one or more portions by entering the first set of protocols, determining a second set of data entry protocols for enabling a user to access the entire digital file from the database and enabling a user to access said entire digital file by entering the second set of data entry protocols in response to the user accessing the one portion or some threshold of a predetermined number of such portions.
摘要:
A computer implemented method and apparatus for sending and receiving electronic mail messages. A group header is defined using simple mail transmission protocol. The group header provides information about a set of members of a group. The set of members of the group are one or more recipients of the electronic mail message. The group header is placed in the electronic mail message to form a completed electronic mail message addressed to the group. The completed electronic mail is sent to the group.
摘要:
Predetermining a first set of data entry protocols for enabling a user to access one or more portions of an initial digital file. Predetermining a second set of data entry protocols for enabling a user to access another digital file by entering this second set of data entry protocols in response to the user accessing a threshold of a predetermined number of such portions. The first set of data entry protocols may include an acceptance by the user to pay a first fee for each accessed portion. In addition, under such circumstances, the access to the another digital file may be offered free of any fee as a reward for the user paying fees for the portions of the initial digital file accessed reaching a predetermined threshold level.
摘要:
The invention discloses a platform authentication method suitable for trusted network connect (TNC) architecture based on tri-element peer authentication (TePA). The method relates to a platform authentication protocol of tri-element peer authentication, and the protocol improves network security as compared with prior platform authentication protocols; in the platform authentication protocol of the TNC architecture based on TePA, a policy manager plays a role as a trusted third party, which is convenient for concentrated management, thus enhancing manageability; the invention relates to the platform authentication protocol of the TNC architecture based on TePA, has different implementation methods and is beneficial for different dispositions and realizations.
摘要:
A method for establishing a secure network architecture, a method and system for secure communication are provided. Said method for establishing a secure network architecture includes: 1) constructing the network architecture where the identities of nodes are legal, including: neighboring node discovery; performing identities certification and shared key negotiation between a node and the neighbor node; 2) constructing a secure switching device architecture, including: establishing a shared key between every two of the switch devices.
摘要:
A method for combining authentication and secret keys management mechanism in a sensor network includes the following steps: 1) pre-distribution of the secret key, which includes 1.1) the pre-distribution of the communication secret key and 1.2) the pre-distribution of the initial broadcast message authentication secret key; 2) authentication, which includes 2.1) the authentication of the node identity and 2.2) the authentication of the broadcast message; and 3) negotiation of the session secret key by the nodes.
摘要:
The invention discloses a platform authentication method suitable for trusted network connect (TNC) architecture based on tri-element peer authentication (TePA). The method relates to a platform authentication protocol of tri-element peer authentication, and the protocol improves network security as compared with prior platform authentication protocols; in the platform authentication protocol of the TNC architecture based on TePA, a policy manager plays a role as a trusted third party, which is convenient for concentrated management, thus enhancing manageability; the invention relates to the platform authentication protocol of the TNC architecture based on TePA, has different implementation methods and is beneficial for different dispositions and realizations.
摘要:
This invention is a real-time system that detects click fraud and blocks those click fraud. This system will be used as an arbitration system to evaluate the quality of every click referred from PPC publishers, thus helping advertiser saving money. The invention uses innovative matching between two logs, client side log and server side log, to find out software click and detect abnormal activities, such as no mouse movement, no mouse clicks, repeat clicks etc. The system includes three parts working cooperatively: a database for logging user click parameter and reporting click fraud, web servers with filter program such as ISAPI filter, CGI or other server side script program, and tracking code inserted to a web page, executed on client computer. The system can also block any fraudulent traffic in real time.