Sign up

AcclaimIP-ad

Match Document Document Title
8838925 Method for securely storing data in a memory of a portable data carrier  
A method for securely storing data in a multilevel memory of a portable data carrier. The multilevel memory includes one or several multilevel memory cells (SZ) which can assume respectively at...
8838924 Microprocessor having internal secure memory  
An apparatus providing for a secure execution environment. The apparatus includes a microprocessor that is configured to execute non-secure application programs and a secure application program,...
8838908 Using ephemeral stores for fine-grained conflict detection in a hardware accelerated STM  
A method and apparatus for fine-grained filtering in a hardware accelerated software transactional memory system is herein described. A data object, which may have an arbitrary size, is associated...
8838926 Interacting with data in hidden storage  
Unused storage space within a data storage is utilized to store data while effectively making it appear to the operating system, other programs, and the user that the space is still available or...
8832352 Hypervisor-driven protection of data from virtual machine clones  
A system and method for protecting secure data from virtual machine clones are disclosed. In accordance with one embodiment, a hypervisor transmits a message to a guest operating system hosted by a...
8832402 Self-initiated secure erasure responsive to an unauthorized power down event  
Method and apparatus for self-initiated secure erasure of data from a non-volatile memory, such as a solid state drive (SSD). In accordance with various embodiments, the memory is operated in...
8832351 Virtualizing processor memory protection with “L1 iterate and L2 drop/repopulate”  
In a computing system including a processor and virtualization software including a guest operating system (OS) that utilizes a guest domain access control register (DACR) containing domain access...
8832825 Challenge-response methodology for securing vehicle diagnostic services  
A method for locally authenticating a vehicle diagnostic tool with a vehicle using a challenge-response authentication scheme includes: receiving a pairing request from the vehicle diagnostic tool;...
8826459 Systems and methods of automatic multimedia transfer and playback  
Digital rights management to protect copyrighted materials is a common element of consumers accessing content for a variety of uses including business and recreational. Such techniques have been...
8826461 Method and system for protecting data, storage device, and storage device controller  
A method and a system for protecting data, a storage device, and a storage device controller are provided. In the present method, when a host accesses data in the storage device, whether the host...
8819362 Managing replication and reservations  
A method is used in managing replication and reservations. An amount of data storage space at a destination data storage location is determined that corresponds to expected successful completion of...
8819355 Information processing apparatus, information processing method, and program  
An information processing apparatus includes: a storage unit having a plurality of storage areas which holds storage data including main body data and order data according to the writing order of...
8819378 Data processing apparatus and method for performing memory transactions within such a data processing apparatus  
A data processing apparatus has processing circuitry for executing a memory access instruction in order to generate a memory transaction comprising at least one address transfer specifying a memory...
8819349 Invoking operating system functionality without the use of system calls  
Embodiments of the invention operate within the context of a system with a processor providing memory-monitoring functionality. The lower-privileged code of a first process, such as user...
8812804 Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices  
A secure demand paging (SDP) system includes a dynamic random access memory (DRAM), a microprocessor having a secure internal memory and coupled to said DRAM, and a non-volatile memory storing a...
8812872 Memory managment method  
In the conventional method of maintaining the confidential a program, wherein a program to be executed in an information processing device is stored in a hard disk, etc., in an encrypted state and...
8806110 Flexible memory protection and translation unit  
A memory management and protection system that manages memory access requests from a number of requestors. Memory accesses are allowed or disallowed based on the privilege level of the requestor,...
8806119 Storage subsystem that connects fibre channel and supports online backup  
The storage system includes first and second disk arrays. The first disk array has a first port coupled to a second port of the second disk array, a port controller controlling the first port, a...
8806073 Content-aware digital media storage device and methods of using the same  
A content-aware digital media storage device includes a host device interface for exchanging digital information with a host device, a memory array for storing digital information received from the...
8806165 Mass-storage system utilizing auxiliary solid-state storage subsystem  
A mass storage system including main and auxiliary storage subsystems and a controller Main storage provides physical storage space and includes non-solid-state storage devices (“NSSDs”) NSSDs pro...
8806657 Method and apparatus for setting access restriction information  
The storage system includes a host computer; a management computer coupled to the host computer; a first storage device coupled to the host computer and the management computer, and including first...
8806164 Apparatus, electronic devices and methods associated with an operative transition from a first interface to a second interface  
Subject matter disclosed herein relates to an apparatus comprising memory and a controller, such as a controller which determines block locking states in association with operative transitions...
8806104 Enabling virtualization of a processor resource  
In one embodiment, a processor includes an access logic to determine whether an access request from a virtual machine is to a device access page associated with a device of the processor and if so,...
8806654 Controlling the access of master elements to slave elements over a communication bus  
A system comprises one or more slave elements operably coupled to a plurality of master devices. A central protection function is operably coupled to a first communication bus and configured to...
8799604 Data storage apparatus, information processing apparatus, information processing method, and program  
An information storage apparatus that includes a memory unit, a first controller that reads data from the memory unit, and a second controller included in the memory unit that reads a first...
8799601 Techniques for managing deduplication based on recently written extents  
A technique is directed to managing deduplication of extents in a data storage apparatus having processing circuitry and memory which stores the extents (e.g., blocks). The technique involves...
8800008 Data access control systems and methods  
Various hardware and software configurations are described herein which provide improved security and control over protected data. In some embodiments, a computer includes a main motherboard card...
8799575 Memory card cleaner and method of utilization  
A system and method for verifying memory cards. A memory card is received in a card reader in communication with a computing device. The memory card is scanned utilizing a computing device. A...
8793785 Revokeable MSR password protection  
A microprocessor includes a model specific register (MSR) having an address, fuses manufactured with a first predetermined value, and a control register. The microprocessor initially loads the...
8793457 Method and system for policy-based secure destruction of data  
An apparatus, system, and method are disclosed for policy-based secure destruction of data. The method for policy-based secure destruction of data is provided. In one embodiment, the method...
8793447 Restoration of a parent LUN through modification of a read-write clone LUN as the parent LUN  
A method, apparatus and system of restoration of a parent LUN through modification of a read-write clone LUN as the parent LUN are disclosed. In one embodiment, the method includes transforming a...
8788763 Protecting memory of a virtual guest  
An apparatus and system for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that...
8788774 Protecting data during different connectivity states  
Aspects of the subject matter described herein relate to data protection. In aspects, during a backup cycle, backup copies may be created for files that are new or that have changed since the last...
8788776 Hard disk control method, hard disk control device and computer  
A hard disk control method, a hard disk control device and a computer are provided The method includes detecting the current mode in which the system runs; determining the access frequency of the...
8789202 Systems and methods for providing real time access monitoring of a removable media device  
A mobile security system connects to a mobile device and filters out attacks and malicious code. Using the mobile security system, a mobile device can be protected by greater security and possibly...
8788775 Memory access control using redundant and non-redundant encoding  
A data processing system 2 including processing circuitry 4 operating in either a first mode or a second mode. Page table data 30 including access control bits 40, 42, is used to control...
8788071 Security for objects in a process plant configuration system  
A configuration system uses process plant items that may represent, or be capable of representing, entities in a process plant to assist in configuring, organizing, and changing the control and...
8782351 Protecting memory of a virtual guest  
The method for protecting memory of a virtual guest includes initializing a virtual guest on a host computing system. The host computing system includes a virtual machine manager that manages...
8782367 Memory area protection circuit  
A circuit for controlling the access to at least one area of a memory accessible by a program execution unit, including a first instruction address input; at least one second data address input,...
8782086 Updating dispersed storage network access control information  
In a dispersed storage network where slices of secure user data are stored on geographically separated storage units, a managing unit connected to the network may seek to broadcast and update...
8782352 System and method for supporting a self-tuning locking mechanism in a transactional middleware machine environment  
A lock mechanism can be supported in a transactional middleware system to protect transaction data in a shared memory when there are concurrent transactions. The transactional middleware machine...
8782343 System and method for optimizing data remanence over hybrid disk clusters using various storage technologies  
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming...
8775715 Protection of data from virtual machine clones via paravirtualization  
A system and method for protecting secure data from virtual machine clones are disclosed. In accordance with one embodiment, a hypervisor receives a message from a guest operating system hosted by...
8775811 Simple non-autonomous peering environment, watermarking and authentication  
A Secure Non-autonomous Peering (SNAP) system includes a hierarchical digital watermarking scheme, a central licensing authority, licensed fabricators and assemblers.
8775757 Trust zone support in system on a chip having security enclave processor  
An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more...
8769229 Memory pinning through buffer encapsulation  
The present invention extends to methods, systems, and computer program products for memory pinning through buffer encapsulation. Within a managed execution environment, a wrapper object...
8769228 Storage drive based antimalware methods and apparatuses  
An anti-malware approach uses a storage drive with the capability to lock selected memory areas. Platform assets such as OS objects are stored in the locked areas and thus, unauthorized changes to...
8769635 Managing connections in a data storage system  
Described in detail herein are systems and methods for managing connections in a data storage system. For example, the systems and methods may be used to manage connections between two or more...
8769624 Access control utilizing indirect authentication  
Techniques are provided for granting authorization to restricted content on a display device from an authorizing device. In one embodiment, the display device may operate in a display mode where...
8762647 Multicore processor system and multicore processor  
According to one embodiment, a multicore processor system includes: a memory region, and a multicore processor that includes plural cores, a first cache, and a second cache shared between the...