AcclaimIP-ad

Match Document Document Title
9037824 Password accessible microelectronic memory  
A microelectronic memory may be password access protected. A controller may maintain a register with requirements for accessing particular memory locations to initiate a security protocol. A...
9026756 Memory device with copyright protection  
According to one embodiment, a memory device includes a semiconductor memory, a memory controller which controls the semiconductor memory according to a request from outside the device, a radio...
9026755 Content control systems and methods  
What is disclosed is a control system which includes an interface configured to receive a content request from a request source wherein the content request identifies content stored on a storage...
9021224 Method and apparatus for enhanced computer security  
A computer system and an access restriction method may be used to enable security and improve reliability. The computer system includes a first storage apparatus and a second storage apparatus....
9021225 Dynamic address translation with fetch protection in an emulated environment  
What is provided is an enhanced dynamic address translation facility. In one embodiment, a virtual address to be translated is first obtained and an initial origin address of a translation table...
9015439 Event lock storage device  
A system and method are disclosed for an event lock storage device. The storage device includes a user partition and an event partition (which may be associated with an event). The storage device...
9015432 Establishing a mapping to a virtual disk  
A system, computer program product, and computer implemented method for mapping a Virtual machine (VM) drive to underlying storage, the method comprising locating a signature for a disk mounted to...
9009386 Systems and methods for managing read-only memory  
A system includes a memory device including a real memory and a tracking mechanism configured to track relationships between multiple virtual memory addresses and real memory. The system further...
9003161 Systems and methods for managing read-only memory  
A first virtual memory address is mapped to a real memory in a memory device, and a second virtual memory address is mapped to the real memory. Here, the first virtual memory address is authorized...
9003138 Read signature command  
A method, system, and computer program product for providing a first site the ability to execute a read signature command, wherein the read signature command takes a set of arguments, wherein at...
9003148 Microcomputer and method for controlling memory access  
A microcomputer includes a CPU, a protection information storage configured to store memory protection information specifying an access permission or a prohibited state to a memory space by a...
8996831 System and method for logical deletion of stored data objects  
Systems and methods for providing object versioning in a storage system may support the logical deletion of stored objects. In response to a delete operation specifying both a user key and a...
8996832 Method and system for responding to client requests for information maintained by storage systems  
Method and system for providing information regarding a plurality of storage devices managed by a plurality of storage servers are provided. The storage space at the storage devices is presented...
8996828 Systems and methods for migrating data  
Various embodiments provide systems and methods for migrating data. One system includes a small computer system interface logical unit number (SCSI LUN) configured to store protected data, a...
8990530 Storage system in which fictitious information is prevented  
According to one embodiment, a storage system includes a host device and a secure storage. The host device and the secure storage produce a bus key which is shared only by the host device and the...
8990577 Information processing apparatus and data protection method  
According to an embodiment, an information processing apparatus includes a first storage unit, a second storage unit, a power supply state control unit, a cryptographic key movement unit, a...
8971144 Hardware write-protection  
A system for providing write-protection functionality to a memory device includes: a memory device including configurable registers controlling write and erase operations in the memory device; a...
8972647 Kernel memory locking for systems that allow over-commitment memory  
Provided are techniques for allocating logical memory corresponding to a logical partition in a computing system; generating a S/W PFT data structure corresponding to a first page of the logical...
8966202 Wireless communication device  
In this wireless communication device, a storage unit stores writing identification information relating to permission and prohibition of writing. An acquisition unit acquires device...
8966646 Software license management  
A method of managing a software license comprises loading a software program into volatile memory, obtaining authorization data, modifying a portion of the volatile memory relied upon by the...
8954751 Secure memory control parameters in table look aside buffer data fields and support memory array  
Techniques and apparatus for utilizing bits in a translation look aside buffer (TLB) table to identify and access security parameters to be used in securely accessing data are provided. Any type...
8935541 Method and apparatus for encrypting and processing data in flash translation layer  
A method and apparatus for preventing a user from interpreting optional stored data information even when the user extracts the optional stored data, by managing data associated with a flash...
8924674 Permissions of objects in hosted storage  
A data object is stored in a hosted storage system and includes an access control list specifying access permissions for data object stored in the hosted storage system. The hosted storage system...
8918612 Method and apparatus for verifying memory contents  
A system and method of verifying a content of a non-volatile reprogrammable memory communicatively coupled to a microprocessor is disclosed. The method comprises the steps of reading at least a...
8918611 Semiconductor device and data processing method  
A semiconductor device has: as security states to which the nonvolatile memory device can transition, an unprotected state in which, when secret information is not set in the nonvolatile memory...
8914328 Backup information management  
Information management is disclosed. A file output from an application to an operating system is intercepted before the file output arrives at the operating system. The file output is directed...
8909847 Procedure for accessing a non-volatile watch memory  
The invention relates to a procedure for accessing a non-volatile watch memory, the watch comprising two supply terminals accessible from the outside that define a potential difference...
8909825 System for determining a maximum multiplicity set for communication lines between a plurality of devices using a calculated rate received from the plurality of devices  
A storage device includes a processing state value calculator that calculates a first processing state value representing a state of data forwarding from the storage device via the connection...
8904552 System and method for protecting data information stored in storage  
A system and method are provided for protecting data information stored in a storage medium. The system includes a memory unit which is divided into a plurality of storage regions in which data...
8898445 System and method of enabling a function within a module configured to be used within an information handling system  
A system and method of enabling a function within a module configured to be used with an information handling system is disclosed. In one form, the method of enabling functions includes detecting...
8891302 Electronic equipment  
Electronic equipment according to the present disclosure includes a writable non-volatile memory, a plurality of volatile memories, and a sequencer. The writable non-volatile memory stores an...
8892837 Integrated circuit with tamper-detection and self-erase mechanisms  
Methods and apparatuses for improving security of an integrated circuit (IC) are provided. A tamper condition is detected and a digital key stored in the IC is erased. The digital key is...
8874866 Memory access system  
Embodiments of the present invention provide methods of reading data from and writing data to a memory, computer program products for performing such methods, and apparatus for reading data from...
8868868 Method and system for responding to client requests for information maintained by storage systems  
Method and system for providing information regarding a plurality of storage devices managed by a plurality of storage servers are provided. The storage space at the storage devices is presented...
8856489 Logical sector mapping in a flash storage array  
A system and method for efficiently performing user storage virtualization for data stored in a storage system including a plurality of solid-state storage devices. A data storage subsystem...
8856474 Nonvolatile memory unit with secure erasing function  
An apparatus includes a nonvolatile memory, an interface that at least receives an erase command of the nonvolatile memory, a first controller that controls the nonvolatile memory to execute data...
8856544 System and method for providing secure virtual machines  
The present invention provides improved security in a virtual machine. By extending the capabilities of modern secure processors, privacy of computation is provided from both the owner of the...
8850231 Data encryption using a key and moniker for mobile storage media adapted for library storage  
Disclosed are a method and apparatus for a data storage library comprising a plurality of drives and a combination bridge controller device adapted to direct and make compatible communication...
8844023 Password protected built-in test mode for memories  
A semiconductor memory may be provided with a built-in test mode that is accessible through a password protection scheme. This enables access to a built-in test mode after manufacturing, if...
8836960 Storing device drivers in imaging devices  
Imaging devices incorporating semi-volatile memory are described herein. According to various embodiments, device driver information may be stored in the semi-volatile NAND flash memory. Other...
8839399 Tenant driven security in a storage cloud  
Tenant driven security in a storage cloud is provided. A method includes determining whether a tenant places a physical key into a slot associated with a hard disk provided by a service provider....
8826459 Systems and methods of automatic multimedia transfer and playback  
Digital rights management to protect copyrighted materials is a common element of consumers accessing content for a variety of uses including business and recreational. Such techniques have been...
8817981 Generation of registration codes, keys and passcodes using non-determinism  
In an embodiment, a secure module is provided that provides access keys to an unsecured system. In an embodiment, the secure module may generate passcodes and supply the passcodes to the unsecured...
8812872 Memory managment method  
In the conventional method of maintaining the confidential a program, wherein a program to be executed in an information processing device is stored in a hard disk, etc., in an encrypted state and...
8806119 Storage subsystem that connects fibre channel and supports online backup  
The storage system includes first and second disk arrays. The first disk array has a first port coupled to a second port of the second disk array, a port controller controlling the first port, a...
8793785 Revokeable MSR password protection  
A microprocessor includes a model specific register (MSR) having an address, fuses manufactured with a first predetermined value, and a control register. The microprocessor initially loads the...
8788788 Logical sector mapping in a flash storage array  
A system and method for efficiently performing user storage virtualization for data stored in a storage system including a plurality of solid-state storage devices. A data storage subsystem...
8782352 System and method for supporting a self-tuning locking mechanism in a transactional middleware machine environment  
A lock mechanism can be supported in a transactional middleware system to protect transaction data in a shared memory when there are concurrent transactions. The transactional middleware machine...
8751828 Sharing encryption-related metadata between multiple layers in a storage I/O stack  
A host in an encrypted data storage system sends encryption metadata associated with an encrypted logical volume (LV) from a key controller module to an encryption endpoint via a storage I/O...
8752193 Content binding at first access  
A method and system of binding content at first access is disclosed. A non-volatile storage device may provide a content access script and a content binding script in order to access protected...