首页 / 技术领域 / 别名映射 / 专利数据
序号 专利名 申请号 申请日 公开(公告)号 公开(公告)日 发明人
161 ADDRESSING REMOTE DATA OBJECTS VIA A COMPUTER NETWORK PCT/GB0102269 2001-05-22 WO0190936A2 2001-11-29 ANDERSON RAYMOND; MALHOTRA ANIL; ASSHETON ROBERT JOHN; BONDI JOHNATHAN RICHARD
A system is described for mapping a secondary address to a primary address. The secondary address is used as an alias for the primary address and the primary address references a remote data object, such as an internet web page. The secondary address has a prefix portion that is used to direct a mapping request to a remote database storing mapping data and then a suffix portion of the secondary address is used to index within that remote database to identify the primary address. The primary address and the secondary address may be internet URL addresses. A local cache within a user device may be provided, such as in the form of a browser plug-in. Once the mapping has taken place to establish the link between a secondary address and a primary address, thereafter communication can take place directly between the user device and the target without requiring further mapping.
162 A METHOD AND APPARATUS FOR EXECUTING FLOATING POINT AND PACKED DATA INSTRUCTIONS USING A SINGLE REGISTER FILE PCT/US1996020522 1996-12-17 WO1997022921A1 1997-06-26 INTEL CORPORATION
A method and apparatus for executing floating point and packed data instructions using a single physical register file that is aliased. According to one aspect of the invention, processor is provided that includes a decode unit (1002), a mapping unit (1004), and a storage unit (1006). The decode unit (1002) is configured to decode instructions and their operands from at least one instruction set including at least a first and second set of instructions. The storage unit (1006) includes a physical register file (1020). The mapping unit (1004) is configured to map operands used by the first set of instructions to the physical register file in a stock referenced manner. In addition, the mapping unit (1004) is configured to map operands used by the second set of instructions to the same physical register file in a non-stack reference manner.
163 System, method, and computer program for fetching data from a physical memory queue utilizing an alias queue name US14555495 2014-11-26 US09501228B1 2016-11-22 Sourav Chaterjee
A system, method, and computer program product are provided for fetching data from a physical memory queue utilizing an alias queue name. In use, a physical queue associated with at least a portion of memory is identified. Additionally, a first alias queue name is mapped to the physical queue. Further, data is fetched utilizing the first alias queue name in response to a request to fetch the data from the physical queue.
164 MODULE FOR BUILDING DATABASE QUERIES US12274059 2008-11-19 US20090138455A1 2009-05-28 Paolo Copello
A module for building a database query has a client-side module part and a server-side module part, creating an abstract query object given user-defined query criteria. The user-defined query criteria has alias names for elements of data tables in the database. An abstract query object is sent to a parse and validate entity. The server-side module part extracts mapping information between the alias names and real names of the elements of the data tables from a private configuration table, which stores the mapping information according to a valid internal structure of the database at the time of extraction. A query on the database is created by extracting a query configuration from the abstract query object and resolving the alias names contained in the query configuration by searching the mapping information of the private configuration table. The query is performed on the data tables, the query results are adapted to changes made in the internal structure of the database, a list of available alias names is extracted from the mapping information, the list of the available alias names is forwarded to the client-side module part. The query results are then forwarded to the client-side module part.
165 SIGNALANALYSATOR UND VERFAHREN ZUM ANZEIGEN VON LEISTUNGEN VON CODEKANÄLEN PCT/EP2003/004465 2003-04-29 WO2003107566A1 2003-12-24 FRANKE, Jens; NITSCH, Bernhard; HELLER, Klaus

Die Erfindung betrifft einen Signalanalysator sowie ein Verfahren zum Anzeigen von Leistungen von Code-Kanälen eines CDMA (Code Division Multiple Access)-Signals, das Code-Kanäle mit verschiedenen Spreizfaktoren enthält. Aus einem empfangenen Signal wird die Leistung der einzelnen Code-Kanäle ermittelt. Die gemessenen Leistungen der einzelnen Code-Kanäle für einen bestimmten Basis-Spreizfaktor werden in einem Diagramm (1) dargestellt, wobei diejenigen Code-Kanäle (5, 6), die eine Alias-Leistung aufweisen, gekennzeichnet werden, wobei ein Code-Kanal bezüglich des bestimmten Basis-Spreizfaktors dann eine Alias-Leistung aufweist, wenn der Code-Kanal mit dem Basis-Spreizfaktor (SF64, SF 128) inaktiv ist und ein ihm entsprechender Code-Kanal (C68, C144) eines höheren Spreizfaktors (SF128, SF256) aktiv ist oder bei orthogonaler Transmit Diversity die Leistung eines Code-Kanals auf den Code-Kanal des Basis-Spreizfaktors abgebildet wird.

166 Alias address support US554186 1990-07-16 US5119290A 1992-06-02 William V. Loo; John Watkins; Joseph Moran; William Shannon; Ray Cheng
Improvements in workstations which utilizes virtual addressing in multi-user operating systems with write back caches, including operating systems which allow each user to have multiple active processes directed to the support of alias addresses, i.e., two or more virtual addresses which map to the same physical address in real memory Specifically, alias addresses are created so that their low order address bits are identical, modulo the size of the cache (as a minimum) for user programs which use alias addresses generated by the kernel, or wholely within the kernel. For alias addresses in the operating system, rather than user programs, which cannot be made to match in their low order address bits, their pages are assigned as "Don't Cache" pages in the memory management unit (MMU) employed by workstations which utilize virtual addressing.
167 Edge detection method detecting pixel with alias eliminated therefrom and device for detecting pixel on border line including the pixel JP7842599 1999-03-23 JPH11331607A 1999-11-30 LOCE ROBERT P; IEKIN ZUAN; MICHAEL BRANSIFORT
PROBLEM TO BE SOLVED: To provide the method that detects an image area with alias eliminated therefrom and generates a rendering tag in a text from which alias is eliminated or in an architecture designed for rendering a line area. SOLUTION: A histogramer 204 decides a threshold level for one area of an image in the logical base execution of the edge detection method. In a 1st channel (C1) of the image, a threshold level used to apply binary processing to an image area and decided as a function of a 1st image reference is set, a vector with an existing set of pixels in the binary-processed image area is extracted and applied to a logical arithmetic operation, and suggesting the presence of an existing pattern as output when the existing pattern is present. In a 2nd channel (C2), the similar steps to the channel 1 are conducted. A tag map 216 combines logically the 1st and 2nd channels and generates a tag suggesting the presence or absence of pixels on a gray border line in the image area.
168 Cache memory JP28722892 1992-10-26 JPH06139146A 1994-05-20 IZUMIKAWA MASANORI
PURPOSE: To detect the occurrence of a problem (alias) that data on a physical place simultaneously exist on two or more places in a direct map type cache memory having capacity larger than page size by means of hardware. CONSTITUTION: The cache memory is provided with tag memories 2, 3 each of which is divided by a bit of a virtual page number in an index, comparators 5, 6 for inputting data read out from the tag memories 2, 3 and physical addresses to be address conversion results, a selection circuit 7 for selecting either one of outputs from the comparators 5, 6 in accordance with the bit of the virtual page number in the index and outputting a cache hit HIT and a selection circuit 8 for outputting the existnce/absence of alias based upon the OR of the output from the non-selected comparator. COPYRIGHT: (C)1994,JPO&Japio
169 Hardware security agent for network communications US14194329 2014-02-28 US09225689B2 2015-12-29 Robert Lorch
A hardware security agent may include a request inspector configured to receive an alias at the hardware security agent by way of a network interface of an untrusted computer, and a mapper configured to map the alias to corresponding protected data stored within the hardware security agent. The hardware security agent may further include a substitution manager configured to provide the corresponding protected data from the hardware security agent over a network to a target network site.
170 HARDWARE SECURITY AGENT FOR NETWORK COMMUNICATIONS US14194329 2014-02-28 US20150249646A1 2015-09-03 Robert Lorch
A hardware security agent may include a request inspector configured to receive an alias at the hardware security agent by way of a network interface of an untrusted computer, and a mapper configured to map the alias to corresponding protected data stored within the hardware security agent. The hardware security agent may further include a substitution manager configured to provide the corresponding protected data from the hardware security agent over a network to a target network site.
171 METHOD AND APPARATUS FOR PERFORMING PATH STROKING US15260684 2016-09-09 US20170076470A1 2017-03-16 Jeongjoon YOO; Sundeep KRISHNADASAN; Jaedon LEE; Sangoak WOO
A method of performing path stroking includes determining whether or not aliasing based on a primitive included in a path will occur using data about the path, generating a texture to be used for performing path stroking based on a result of the determining, and mapping the texture along an edge of the primitive.
172 曖昧感応自然言語処理システムにおける同一指示解決 JP2014156393 2014-07-31 JP2014238865A 2014-12-18 MARTIN VAN DEN BERG; RICHARD CROUCH; FRANCO SALVETTI; GIOVANNI LORENZO THIONE; DAVID AHN
【課題】曖昧感応自然言語処理システムにおける同一指示解決のための技術を提供する。【解決手段】情報検索および取り出しシステム内においてインデックス化されている文書を処理し、曖昧承知機構、および曖昧さ解決機能が、同一指示解決と調和して動作する。同一指示存在の注釈、および曖昧な解釈は、テキスト・コンテンツ内における同一行上マークアップによって、または外部存在マップによってサポートする。文書内部で表現されている情報は、事実、またはテキスト内における存在間の関係に関して、規則的に編成する。拡張は、複数の別名、または曖昧さを、インデックス化された存在に適用することをサポートする。【選択図】図3
173 Multimedia network transposition US13793661 2013-03-11 US09025755B1 2015-05-05 Vijay Jayapalan; Susan Blake; Frederick Eugene Diehl, Jr.; Jerry Scott Beene; Michael Sjolander
Methods and systems for routing multimedia traffic are described. A method may include receiving a communication originating from a user, transposing an alias transport network over one or more existing networks to route the communication, and routing the communication based on mapping rules.
174 Flexible Memory Addressing For Data Security US14042290 2013-09-30 US20150095661A1 2015-04-02 John V. Sell; Ling Tony Chen; Paul Paternoster
Regions of system memory in a computer system are managed to maintain privacy and integrity of data. A system address space for memory is divided into a plurality of aliased addressed spaces. Each of the aliased address spaces is associated with its own unique encryption key. The system address space is managed using the aliased address spaces to provide data isolation and privacy for different system processes. One or more aliased address spaces can be provided with additional data integrity capabilities. Data associated with an integrity-checked aliased address space is subjected to data integrity checking, using authentication-based techniques such as hashing, for example. Additionally, a set of contiguous addresses in the aliased address space is defined, while being mapped to a set of non-contiguous addresses in the corresponding physical address space for additional data security.
175 Electronic document mapping US09835856 2001-04-17 US20020013810A1 2002-01-31 Pang Hwee Hwa
A method of mapping the identity of at least one electronic document, the at least one electronic document having a resource locator, the method including the steps of: (a) receiving a request for an alias of the resource locator from a client; (b) recovering the resource locator from the alias resource locator, (c) retrieving the at least one electronic document at the resource locator; (d) creating a new alias resource locator; and (e) returning the electronic document under the new alias resource locator to the client.
176 아이피망을 이용한 일반전화기에서 호출 가능한 인터넷전화번호 부여방법 KR1020010005990 2001-02-07 KR100398350B1 2003-09-19 송용호
PURPOSE: A method for granting an Internet phone number, which a generic phone can call, using an IP network is provided to make a gateway connected with an Internet phone through a gatekeeper using an Internet phone number and to enable a generic phone user to make a telephone call to an Internet phone if he takes an authentication procedure that a main server provides. CONSTITUTION: An Internet phone number mapping table format is composed of an IP address field(61), an alias name field(62), an e-mail number field(63), a phone number(E.164) field(64), and a status field(65). A supplemental part(130) for Internet phone recognition is added to each field, except the IP address field(61) and the status field(65). Each supplemental part(130) is composed of an Internet phone number service provider identification number(110) and an Internet phone number identification number(120).
177 Dynamic associative storage security for long-term memory storage devices US10983320 2004-11-06 US07814554B1 2010-10-12 Gary Dean Ragner
A hierarchical folder security system for mapping files into and out of alias directories and/or real directories depending on: 1) the directory of the specific file being accessed, 2) the program thread requesting access to a memory storage device (114), and 3) the type of access request being made (i.e. load, save, run, etc.). For write access requests (i.e. save, modify, paste, delete, cut, move, rename, etc.), security controller (180) determines if the requested folder access address (150a) is associated with the requesting program's folder address (168). If it is, the file is written at absolute address (156b) on disk platter (160) through real folder map (152). If requested address (150a) is not associated with program folder address (168), then an alias directory address is created and the file is written at alias address (156a) through alias folder address map (154).
178 아이피망을 이용한 일반전화기에서 호출 가능한 인터넷전화번호 부여방법 KR1020010005990 2001-02-07 KR1020020065803A 2002-08-14 송용호
PURPOSE: A method for granting an Internet phone number, which a generic phone can call, using an IP network is provided to make a gateway connected with an Internet phone through a gatekeeper using an Internet phone number and to enable a generic phone user to make a telephone call to an Internet phone if he takes an authentication procedure that a main server provides. CONSTITUTION: An Internet phone number mapping table format is composed of an IP address field(61), an alias name field(62), an e-mail number field(63), a phone number(E.164) field(64), and a status field(65). A supplemental part(130) for Internet phone recognition is added to each field, except the IP address field(61) and the status field(65). Each supplemental part(130) is composed of an Internet phone number service provider identification number(110) and an Internet phone number identification number(120).
179 ALIASED KEYS FOR FEDERATED DATABASE QUERIES US11930937 2007-10-31 US20090112794A1 2009-04-30 Richard Dean Dettinger; Jan Theresa Karels; Richard Joseph Stevens
Embodiments of the invention provide techniques for performing federated queries of data records stored in multiple data sources. In one embodiment, an aliased key table may be configured to store relationships between key fields of multiple data sources. The aliased key table may specify a mapping function to translate a value of one key field to an equivalent value of a second key field. The mapping function may be used with a mapping table storing sets of key values of different data sources, with each set corresponding to a given entity. In another embodiment, the mapping function may call a web service configured to translate key values. In yet another embodiment, federated queries may be specified in terms of attributes, which may be matched to key values.
180 METHOD FOR EXECUTING FEDERATED DATABASE QUERIES USING ALIASED KEYS US11936868 2007-11-08 US20090125540A1 2009-05-14 Richard Dean Dettinger; Jan Theresa Karels; Richard Joseph Stevens
Embodiments of the invention provide techniques for performing federated queries of data records stored in multiple data sources. In one embodiment, an aliased key table may be configured to store relationships between key fields of multiple data sources. The aliased key table may specify a mapping function to translate a value of one key field to an equivalent value of a second key field. The mapping function may be used with a mapping table storing sets of key values of different data sources, with each set corresponding to a given entity. In another embodiment, the mapping function may call a web service configured to translate key values. In yet another embodiment, federated queries may be specified in terms of attributes, which may be matched to key values.
QQ群二维码
意见反馈