Sign up


Match Document Document Title
8898412 Methods and systems to selectively scrub a system memory  
A computer system is provided, the computer system having a processor and a system memory coupled to the processor. The computer system also includes a Basic Input/Output System (BIOS) in...
8898413 Point-in-time copying of virtual storage  
A method includes making in a real storage, a copy of a first page content stored in a first page data structure by creating a second page content in a second data structure, the second page...
8898671 Processor that executes a plurality of threads by promoting efficiency of transfer of data that is shared with the plurality of threads  
Provide is a processor that can maintain a dependency relationship between a plurality of instructions and one read instruction. The processor comprises: a setting unit configured to set, when an...
8898397 Memory and process sharing across multiple chipsets via input/output with virtualization  
Embodiments of the present invention provide an approach for memory and process sharing via input/output (I/O) with virtualization. Specifically, embodiments of the present invention provide a...
8898407 Incremental block based backup  
A method, article of manufacture, and apparatus for protecting data. In some embodiments, this includes taking a snapshot of a physical volume with a native snapshot program, determining which...
8892838 Point-in-time copying of virtual storage and point-in-time dumping  
A method includes copying a first virtual storage by making, a point-in-time copy of a first page content stored in a first structure by creating a second page content in a second structure, the...
8892507 Providing file system quota support for a file system having separated data and metadata  
Described are techniques for performing quota management in a distributed file system. An allocation quota specifies an upper limit of storage for allocation for a quota set of the distributed file...
8892837 Integrated circuit with tamper-detection and self-erase mechanisms  
Methods and apparatuses for improving security of an integrated circuit (IC) are provided. A tamper condition is detected and a digital key stored in the IC is erased. The digital key is associated...
8892810 Semiconductor device and memory protection method  
According to one embodiment, a semiconductor device includes a processor, and a memory device. The memory device has a nonvolatile semiconductor storage device and is configured to serve as a main...
8892832 Storage apparatus, storage management method, and storage medium storing storage management program  
Provided are a storage apparatus, a storage management method, and a storage management program capable of performing a backing-up operation under the condition that a host computer is in...
8893267 System and method for partitioning resources in a system-on-chip (SoC)  
In a system-on-chip (SoC), a method is provided for partitioning access to resources. A plurality of processors is provided, including a configuration master (CM) processor, a memory, a plurality...
8886904 Managing a solid-state storage device  
A method, comprising: during a normal operating mode of a first solid-state storage device, reserving a portion of an available physical storage space of the first solid-state storage device,...
8886876 Protecting groups of memory cells in a memory device  
Methods for memory block protection and memory devices are disclosed. One such method for memory block protection includes programming protection data to protection bytes diagonally across...
8886907 ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***
Accessing objects in hosted storage
 
A first access control list method is stored in a hosted storage system and in association with a storage structure. The first access control list is designed to grant permission to write data...
8886899 Managing memory requests based on priority  
Managing access to an external memory in a computing system comprising one or more cores includes: receiving memory requests to access a memory at a memory controller coupled to at least one of the...
8886716 Cloud-based de-duplication  
Example apparatus, methods, and computers support cloud-based de-duplication with transport layer transparency. One example apparatus includes a processor, a memory, and an interface to connect the...
8880827 Method for executing security-relevant and non-security-relevant software components on a hardware platform  
A method for executing safety-relevant and non-safety-relevant software components on a hardware platform comprising a computer, memory and a monitoring component that operates independently of the...
8880826 System and method for write once read many (WORM) storage in an information handling system  
A Write-Once Read-Many (WORM) memory controller receives data from a processing system that is addressed to a location in a storage device, stores the data and a tag at the location, receives...
8881290 Method and apparatus for computer code obfuscation and deobfuscation using boot installation  
In the field of computer software, obfuscation techniques for enhancing software security are applied to compiled (object) software code. The obfuscation results here in different versions...
8874865 Memory type-specific access control of a field of a record  
A computing system includes computer memory of a number of different memory types. An application program compiled for execution on the computing system controls access to a field of a record in...
8868622 Method and apparatus for allocating resources in a computer system  
Embodiments of the present invention provide a computer system, comprising at least two logical partitions, each partition having allocated computing resources, wherein the computing resources...
8868867 Method for reducing latency of accessing data stored in a file system on a computer storage device by caching file system permission information in the computer storage device  
Systems and methods of storage device access are provided, where the operating system copies permission and mapping information to the storage array and/or to the application program's memory. The...
8868833 Processor and cache arrangement with selective caching between first-level and second-level caches  
Approaches for caching addressable items in a multiprocessor system. Instructions are cached in a plurality of first-level instruction caches respectively coupled to a plurality of processors of...
8868866 Configurable tape loader with internal hard-disk  
A data archiving apparatus includes an autoloader for automated transfer of data tape cartridges between at least one tape drive and storage locations of at least one cartridge storage magazine....
8868822 Data-processing method, program, and system  
A data-processing method in a flash memory with a plurality of sectors, the method includes arranging first data which is not updated in a first sector at a leading portion of a second sector and...
8856473 Computer system protection based on virtualization  
Embodiments of the present invention provide a virtualization protection system (VPS) that leverages virtual machine monitor (VMM) technology. In some embodiments, a computer system contains a host...
8850131 Memory request scheduling based on thread criticality  
A method includes scheduling a memory request requested by a thread executing on a processing system. The scheduling is based on at least one of a number of critical sections being executed on the...
8850149 Information processing apparatus, control method of the information processing apparatus and program  
An apparatus includes a first storage unit, a second storage unit, a setting unit configured to set a level of data deletion used for executing a job, an identification unit configured to identify...
8850231 Data encryption using a key and moniker for mobile storage media adapted for library storage  
Disclosed are a method and apparatus for a data storage library comprising a plurality of drives and a combination bridge controller device adapted to direct and make compatible communication...
8850150 Managing security in solid-state devices  
A computing device and method for managing security of a memory or storage device without the need for administer privileges. To access the secure memory, a host provides a data block containing a...
8843998 Apparatus, systems and methods for secure and selective access to services in hybrid public-private infrastructures  
Embodiments of apparatus, systems and methods facilitate deployment of distributed computing applications on hybrid public-private infrastructures by facilitating secure access to selected services...
8843693 Non-volatile memory and method with improved data scrambling  
A memory device cooperating with a memory controller scrambles each unit of data using a selected scrambling key before storing it in an array of nonvolatile memory cells. This helps to reduce...
8838925 Method for securely storing data in a memory of a portable data carrier  
A method for securely storing data in a multilevel memory of a portable data carrier. The multilevel memory includes one or several multilevel memory cells (SZ) which can assume respectively at...
8838924 Microprocessor having internal secure memory  
An apparatus providing for a secure execution environment. The apparatus includes a microprocessor that is configured to execute non-secure application programs and a secure application program,...
8838908 Using ephemeral stores for fine-grained conflict detection in a hardware accelerated STM  
A method and apparatus for fine-grained filtering in a hardware accelerated software transactional memory system is herein described. A data object, which may have an arbitrary size, is associated...
8838926 Interacting with data in hidden storage  
Unused storage space within a data storage is utilized to store data while effectively making it appear to the operating system, other programs, and the user that the space is still available or...
8832352 Hypervisor-driven protection of data from virtual machine clones  
A system and method for protecting secure data from virtual machine clones are disclosed. In accordance with one embodiment, a hypervisor transmits a message to a guest operating system hosted by a...
8832402 Self-initiated secure erasure responsive to an unauthorized power down event  
Method and apparatus for self-initiated secure erasure of data from a non-volatile memory, such as a solid state drive (SSD). In accordance with various embodiments, the memory is operated in...
8832351 Virtualizing processor memory protection with “L1 iterate and L2 drop/repopulate”  
In a computing system including a processor and virtualization software including a guest operating system (OS) that utilizes a guest domain access control register (DACR) containing domain access...
8832825 Challenge-response methodology for securing vehicle diagnostic services  
A method for locally authenticating a vehicle diagnostic tool with a vehicle using a challenge-response authentication scheme includes: receiving a pairing request from the vehicle diagnostic tool;...
8826459 Systems and methods of automatic multimedia transfer and playback  
Digital rights management to protect copyrighted materials is a common element of consumers accessing content for a variety of uses including business and recreational. Such techniques have been...
8826461 Method and system for protecting data, storage device, and storage device controller  
A method and a system for protecting data, a storage device, and a storage device controller are provided. In the present method, when a host accesses data in the storage device, whether the host...
8819362 Managing replication and reservations  
A method is used in managing replication and reservations. An amount of data storage space at a destination data storage location is determined that corresponds to expected successful completion of...
8819355 Information processing apparatus, information processing method, and program  
An information processing apparatus includes: a storage unit having a plurality of storage areas which holds storage data including main body data and order data according to the writing order of...
8819378 Data processing apparatus and method for performing memory transactions within such a data processing apparatus  
A data processing apparatus has processing circuitry for executing a memory access instruction in order to generate a memory transaction comprising at least one address transfer specifying a memory...
8819349 Invoking operating system functionality without the use of system calls  
Embodiments of the invention operate within the context of a system with a processor providing memory-monitoring functionality. The lower-privileged code of a first process, such as user...
8812804 Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices  
A secure demand paging (SDP) system includes a dynamic random access memory (DRAM), a microprocessor having a secure internal memory and coupled to said DRAM, and a non-volatile memory storing a...
8812872 Memory managment method  
In the conventional method of maintaining the confidential a program, wherein a program to be executed in an information processing device is stored in a hard disk, etc., in an encrypted state and...
8806110 Flexible memory protection and translation unit  
A memory management and protection system that manages memory access requests from a number of requestors. Memory accesses are allowed or disallowed based on the privilege level of the requestor,...
8806119 Storage subsystem that connects fibre channel and supports online backup  
The storage system includes first and second disk arrays. The first disk array has a first port coupled to a second port of the second disk array, a port controller controlling the first port, a...