Sign up


Match Document Document Title
9015438 System and method for achieving enhanced performance with multiple networking central processing unit (CPU) cores  
The present disclosure discloses a method and network device for achieving enhanced performance with multiple CPU cores in a network device having a symmetric multiprocessing architecture. The...
9015198 Method and apparatus for large scale data storage  
A logical apparatus and associated methods provide highly scalable and flexible data storage in a network of computers. The apparatus provides flexible organizational and access control mechanisms...
9015437 Extensible hardware device configuration using memory  
The present disclosure provides a system and method for implementing extensible hardware configuration using memory. A memory containing an Info Block is provided. The Info Block contains a set of...
9015840 Portable media system with virus blocker and method of operation thereof  
A portable media system with a host computer system and method of operation thereof includes: accessing a public partition of the portable media system for a virus blocker for activation on the...
9015436 Performing an atomic operation without quiescing an interconnect structure  
In one embodiment, the present invention includes a method for receiving a lock message for an address in a processor from a quiesce master of a system. This lock message indicates that a requester...
9015439 Event lock storage device  
A system and method are disclosed for an event lock storage device. The storage device includes a user partition and an event partition (which may be associated with an event). The storage device...
9015432 Establishing a mapping to a virtual disk  
A system, computer program product, and computer implemented method for mapping a Virtual machine (VM) drive to underlying storage, the method comprising locating a signature for a disk mounted to...
9009432 Storage system effectively managing a capacity for remote copy  
In one of the storage control apparatuses in the remote copy system which performs asynchronous remote copy between the storage control apparatuses, virtual logical volumes complying with Thin...
9009386 Systems and methods for managing read-only memory  
A system includes a memory device including a real memory and a tracking mechanism configured to track relationships between multiple virtual memory addresses and real memory. The system further...
9003148 Microcomputer and method for controlling memory access  
A microcomputer includes a CPU, a protection information storage configured to store memory protection information specifying an access permission or a prohibited state to a memory space by a...
9003111 Methods and apparatus providing high-speed content addressable memory (CAM) search-invalidates  
Embodiments of a Content Addressable Memory (CAM) enabling high-speed search and invalidate operations and methods of operation thereof are disclosed. In one embodiment, the CAM includes a CAM cell...
9003116 Protected mode for global platform compliant smart cards  
A multiple application smart card (102) uses hardware firewalls (130) and an internal communications scheme to isolate applications from different service providers. A first application (116) from...
9003147 Electronic device and save data recording method  
A virtual capacity acquisition unit acquires a size of virtual capacity of a save data area from an application. A storage capacity acquisition unit acquires a size of save data of the application....
9003146 Managing memory of a computer  
A method for managing data in a memory of a computer. The method includes the steps of: prohibiting a specified memory area in a memory from being accessed temporarily or intermittently; and...
9003137 Interface systems and methods for accessing stored data  
A modular data and storage management system. The system includes a time variance interface that provides for storage into a storage media of data that is received over time. The time variance...
9003161 Systems and methods for managing read-only memory  
A first virtual memory address is mapped to a real memory in a memory device, and a second virtual memory address is mapped to the real memory. Here, the first virtual memory address is authorized...
8996806 System and method for auditing memory cards  
A system and method for auditing memory cards. A memory card is received in a card reader in communication with a computing device. The memory card is scanned utilizing a computing device. A...
8996797 Dense tree volume metadata update logging and checkpointing  
The embodiments described herein are directed to efficient logging and checkpointing of metadata managed by a volume layer of a storage input/output (I/O) stack executing on one or more nodes of a...
8996848 Less-secure processors, integrated circuits, wireless communications apparatus, methods and processes of making  
An integrated circuit (122) includes an on-chip boot ROM (132) holding boot code, a non-volatile security identification element (140) having non-volatile information determining a less secure type...
8996825 Judgment apparatus, judgment method, and recording medium of judgment program  
A judgment apparatus includes a processor that executes a procedure, the procedure including obtaining a plurality of pieces of data having a certain relationship with a specific number or more of...
8990542 Efficient metadata protection system for data storage  
A method for protecting page-level metadata in a storage system is provided. The method includes providing in a page table first protection data, receiving a command to read data from a page of the...
8990487 Semiconductor memory card access apparatus, a computer-readable recording medium, an initialization method, and a semiconductor memory card  
A predetermined number of erasable blocks positioned at a start of a volume area in a semiconductor memory card are provided so as to include volume management information. A user area following...
8990522 Digital signal processing data transfer  
A technique for transferring data in a digital signal processing system is described. In one example, the digital signal processing system comprises a number of fixed function accelerators, each...
8990394 System and method for providing session-level access management of access requests to a redirected device from a predetermined session  
Managing access requests to a device is provided. The operations may include determining that a device stack corresponds to the device that is remote to the server and is connected locally to a...
8984245 Memory protection unit and method for controlling an access to memory device  
A memory protection unit includes at least a first access control unit and a second access control unit programmed for controlling an access to a memory device. Further a method to operate a...
8977811 Scalable schedulers for memory controllers  
Methods and apparatus to improve throughput and efficiency in memory devices are described. In one embodiment, a memory controller may include scheduler logic to issue read or write requests to a...
8971144 Hardware write-protection  
A system for providing write-protection functionality to a memory device includes: a memory device including configurable registers controlling write and erase operations in the memory device; a...
8972647 Kernel memory locking for systems that allow over-commitment memory  
Provided are techniques for allocating logical memory corresponding to a logical partition in a computing system; generating a S/W PFT data structure corresponding to a first page of the logical...
8972679 Storage device in a locked state  
A method for managing a storage device including identifying a lock timing for the storage device when coupling to a device, transitioning the storage device into a locked state in response to...
8966155 System and method for implementing a high performance data storage system  
A method, apparatus, and computer program product for implementing a high-performance data storage device using block-access memory devices are disclosed. According to an embodiment of the present...
8966163 Non-volatile memory device and method for programming the same  
A non-volatile memory device and a method for programming the same are disclosed. The non-volatile memory device includes first and second memory blocks, each of which includes a plurality of...
8966203 Shared and managed memory unified access  
A managed memory in which multiple computing entities each have a corresponding entity-specific portion that is subject to garbage collection. An immutable buffer is located outside of managed...
8966173 Managing accesses to storage objects  
A method is used in managing accesses to storage objects. Access I/Os being directed to at least one storage object are received into a first queue that operates on a first in first out basis. In...
8966201 Method and system for hijacking writes to a non-volatile memory  
A method and system for accessing enhanced functionality on a storage device is disclosed. A hijack command is sent to the storage device that includes an identifier (such as a signature or an...
8966202 Wireless communication device  
In this wireless communication device, a storage unit stores writing identification information relating to permission and prohibition of writing. An acquisition unit acquires device identification...
8966021 Composable machine image  
A computer system image is executed on a computing node over a network. A system specification file transmitted over the network specifies the computer system image by specifying components of the...
8959304 Management of data processing security in a secondary processor  
A data processing apparatus comprises a primary processor, a secondary processor configured to perform secure data processing operations and non-secure data processing operations and a memory...
8959303 Information processor and multi-core system  
According to one embodiment, an information processor includes an operator and an address protector. The address protector includes a register access interface, an address table, and an access...
8954696 Secure memory management system and method  
The present invention describes a system and a method for securely loading digital information from an external storage device in a non-trusted environment into a memory module in a trusted...
8954695 Secure pool memory management  
In general, the invention is directed to techniques for identifying memory overruns. For example, as described herein, a device includes a main memory that enables an addressable memory space for...
8954699 Techniques for identifying IO hot spots using range-lock information  
A technique of identifying IO hot spots is performed in a data storage apparatus (e.g., a file server). The technique involves updating, in response to host IO operations which lock ranges of...
8949566 Locking access to data storage shared by a plurality of compute nodes  
Methods, apparatuses, and computer program products are provided for locking access to data storage shared by a plurality of compute nodes. Embodiments include maintaining, by a compute node, a...
8949526 Reserving storage space in data storage systems  
A method is used in reserving storage space in data storage systems. A set of logical units (LUs) predefined as file based storage hardware specific LUs are reserved in a restricted access storage...
8949565 Virtual and hidden service partition and dynamic enhanced third party data store  
A system reserves and manages a hidden service partition through components of the hardware platform of a computing device. The hidden partition is not accessible by way of a host operating system...
8949564 Staging electronic publications  
A system includes storage devices for storing content along with two or more computing devices such as a two or more servers. One of the computing devices includes a staging memory that stores...
8943288 Method of controlling memory access  
Provided is a method of controlling memory access. In a system including a first layer element executed in a privileged mode having a first priority of permission to access the entire region of a...
8943287 Multi-core processor system configured to constrain access rate from memory  
A multi-core processor system includes a number of cores, a memory system, and a common access bus. Each core includes a core processor; a dedicated core cache operatively connected to the core...
8938589 Interface methods and apparatus for memory devices using arbitration  
A disclosed example apparatus includes an interface (702, 726) to receive a request to access a memory (602a) of a memory module (600) and a data store status monitor (730) to determine a status of...
8935541 Method and apparatus for encrypting and processing data in flash translation layer  
A method and apparatus for preventing a user from interpreting optional stored data information even when the user extracts the optional stored data, by managing data associated with a flash memory...
8935775 Method and apparatus for dishonest hardware policies  
A system implements dishonest policies for managing unauthorized access requests. The system includes memory management hardware to store a set of dishonest policy bits, each dishonest policy bit...