Match
|
Document |
Document Title |
|
US20100146300 |
HEALTH MONITORING SYSTEM
A health monitoring system includes a plurality of remote user sites, each remote user site comprising at least one health monitoring device for collection of user health monitoring data, an... |
|
US20130024637 |
MEMORY ACCESS UNLOCK
In one implementation, a controller is provided such that when an operation is performed at a first memory location, the controller unlocks access to a second memory location. |
|
US20160246526 |
GLOBAL STANDARD TEMPLATE CREATION, STORAGE, AND MODIFICATION
Methods and systems for a complete vehicle ecosystem are provided. Specifically, systems that when taken alone, or together, provide an individual or group of individuals with an intuitive and... |
|
US20110161592 |
Dynamic system reconfiguration
In some embodiments system reconfiguration code and data to be used to perform a dynamic hardware reconfiguration of a system including a plurality of processor cores is cached and any direct or... |
|
US20070083723 |
Highly-available blade-based distributed computing system
A blade-based distributed computing system, for applications such as a storage network system, is made highly-available. The blade server integrates several computing blades and a blade for a... |
|
US20160085695 |
MEMORY INITIALIZATION IN A PROTECTED REGION
Secure memory allocation technologies are described. A processor includes a processor core and a memory controller that is coupled between the processor core and main memory. The main memory... |
|
US20130212348 |
Secure Memory Interface
A secure memory interface includes a reader block, a writer block, and a mode selector for detecting fault injection into a memory device when a secure mode is activated. The mode selector... |
|
US20100023703 |
HARDWARE TRANSACTIONAL MEMORY SUPPORT FOR PROTECTED AND UNPROTECTED SHARED-MEMORY ACCESSES IN A SPECULATIVE SECTION
A system and method is disclosed for implementing a hardware transactional memory system capable of executing a speculative section of code containing both protected and unprotected memory access... |
|
US20130297902 |
VIRTUAL DATA CENTER
A system and method are provided for securely sharing storage resources in a storage network. One or more organizations are modeled in a structure where each organization includes one or more... |
|
US20170160970 |
DATA STORAGE RESOURCE ALLOCATION USING CATEGORY BLACKLISTING WHEN DATA MANAGEMENT REQUESTS FAIL
A resource allocation system begins with an ordered plan for matching requests to resources that is sorted by priority. The resource allocation system optimizes the plan by determining those... |
|
US20100191911 |
System-On-A-Chip Having an Array of Programmable Processing Elements Linked By an On-Chip Network with Distributed On-Chip Shared Memory and External Shared Memory
An integrated circuit having an array of programmable processing elements and a memory interface linked by an on-chip communication network. Each processing element includes a plurality of... |
|
US20080126727 |
Method for managing recorded streams in a rewritable recording medium
The present invention relates to a method for managing playlists of a rewritable recording medium in order to prevent unlimited playback or illegal edition of television broadcast programs or... |
|
US20110173409 |
Secure Processing Unit Systems and Methods
A hardware Secure Processing Unit (SPU) is described that can perform both security functions and other information appliance functions using the same set of hardware resources. Because the... |
|
US20070130436 |
Electronic Data Storage Medium With Fingerprint Verification Capability
An electronic data storage medium is adapted to be accessed by a data terminal, and includes a processing unit connected to a memory device that stores a data file and security reference data... |
|
US20170185345 |
SYSTEM-ON-CHIP INCUDING ACCESS CONTROL UNIT AND MOBILE DEVICE INCLUDING SYSTEM-ON-CHIP
A System-on-Chip (SoC) includes a communication processor, an application processor that sets a secure mode of the communication processor through a control bus, and an access control unit that... |
|
US20160070656 |
WRITE PROTECTION MANAGEMENT SYSTEMS
Write protection management systems are disclosed. In this regard, in one exemplary aspect, a security control system is provided to authorize and write a specified number of data blocks to a... |
|
US20140331019 |
INSTRUCTION SET SPECIFIC EXECUTION ISOLATION
A system on a chip (SoC) or other integrated system can include a first processor and at least one additional processor sharing a page table. The shared page table can include permission bits... |
|
US20120233428 |
APPARATUS AND METHOD FOR SECURING PORTABLE STORAGE DEVICES
An apparatus and method for controlling and securing information stored on portable USB storage devices. Using the software application stored on the USB storage device in conjunction with... |
|
US20050289311 |
System and method for secure inter-platform and intra-platform communications
A system and method are provided to preserve the confidentiality and/or integrity of a sensitive communication from its source to its destination whether locally on the platform, between... |
|
US20090228639 |
DATA STORAGE DEVICE AND DATA MANAGEMENT METHOD THEREOF
Disclosed is a data storage device including an external switch, a controller and a nonvolatile memory. The external switch selectively generates mode information in response to operation of the... |
|
US20110078461 |
SYSTEM AND METHOD FOR COMMUNICATION IN A WIRELESS MOBILE AD-HOC NETWORK
A system and method for improving digital communication in a wireless mobile ad-hoc network. More specifically, the system includes one or more portable network devices operable to support the... |
|
US20070266214 |
Computer system having memory protection function
A computer system for preventing secret data in a memory area from being erased, altered or leaked due to a buffer overflow attack and the like comprises a memory map circuit for storing an access... |
|
US20050283566 |
Self testing and securing ram system and method
A self-testing and correcting read only memory (RAM) device and methodology is disclosed herein. The device includes at least one array of memory to enable data storage and self-testing RAM... |
|
US20140101763 |
SYSTEMS AND METHODS FOR CAPTURING OR REPLAYING TIME-SERIES DATA
Provided is an intrusion detection system configured to detect anomalies indicative of a zero-day attack by statistically analyzing substantially all traffic on a network in real-time. The... |
|
US20140059316 |
CONCURRENT ACCESS TO A MEMORY POOL SHARED BETWEEN A BLOCK ACCESS DEVICE AND A GRAPH ACCESS DEVICE
A graph access device and block access device can simultaneously access a memory pool shared between the devices. The memory pool may include one or more memory arrays accessed as a single logical... |
|
US20130166922 |
METHOD AND SYSTEM FOR FRAME BUFFER PROTECTION
When content, such as premium video or audio, is decoded, the content is stored in protected memory segments. Read access to the protected memory segments from a component not in a frame buffer... |
|
US20110153944 |
Secure Cache Memory Architecture
A variety of circuits, methods and devices are implemented for secure storage of sensitive data in a computing system. A first dataset that is stored in main memory is accessed and a cache memory... |
|
US20070174573 |
Nonvolatile memory system
To prevent stored information from being changed even at the occurrence of an abnormal condition in an upstream side of a system due to uncontrollable run of an OS. A nonvolatile storage means... |
|
US20050114619 |
Data management system, data management method, virtual memory device, virtual memory control method, reader/writer device, ic module access device and ic module access control method
An ID is stored on an IC module, and a link to data in a virtual memory module is formed, whereby a memory of the IC module is virtually expanded. A file structure in a data storage unit of the IC... |
|
US20170083456 |
METHOD AND APPARATUS FOR PREVENTING UNAUTHORIZED ACCESS TO CONTENTS OF A REGISTER UNDER CERTAIN CONDITIONS WHEN PERFORMING A HARDWARE TABLE WALK (HWTW)
A security apparatus and method are provided for performing a security algorithm that prevents unauthorized access to contents of a physical address (PA) that have been loaded into a storage... |
|
US20160147667 |
ADDRESS TRANSLATION IN MEMORY
According to one general aspect, a computational memory may include memory cells configured to store data and a page table, wherein the page table maps, at least in part, a virtual address to a... |
|
US20160048457 |
DYNAMIC MEMORY ADDRESS REMAPPING IN COMPUTING SYSTEMS
A method provides security in a computing system including a processor having a logical address space and external system memory having physical address space. The method comprises hiding memory... |
|
US20090327634 |
SECURE CONFIGURATION OF TRANSIENT STORAGE DEVICES
Extension fields in a provisioning certificate in the authentication silo of a transient storage device (TSD) are used to provide secure configuration options for TSDs while operating within the... |
|
US20050257017 |
Method and apparatus to erase hidden memory in a memory card
Methods, apparatus, software and systems for securely erasing data from a memory card. A number of hidden spare blocks of memory in an inaccessible region of each memory bank is determined. A... |
|
US20050257016 |
Digital signal controller secure memory partitioning
A controller offers various security modes for protecting program code and data stored in memory and ensuring that the protection is effective during all normal operating conditions of the... |
|
US20130111168 |
SYSTEMS AND METHODS FOR SEMAPHORE-BASED PROTECTION OF SHARED SYSTEM RESOURCES
An electronic system includes multiple data access components (DACs), a semaphores module, and a memory protection unit (MPU). Any of the DACs may issue an access request, which requests access to... |
|
US20120144104 |
Partitioning of Memory Device for Multi-Client Computing System
A method, computer program product, and system are provided for accessing a memory device. For instance, the method can include partitioning one or more memory banks of the memory device into a... |
|
US20110029721 |
Cascaded combination structure of flash disks to create security function
Disclosed is a cascaded combination structure of flash disks to create security function, comprising of a plurality of data disks and a key disk. Each of the data disks includes a public zone and... |
|
US20060200629 |
USB storage device and program
A USB storage device having the function of preventing stored software from being deleted by mistake achieved with as simple a structure as possible. In the USB storage device, the storage area is... |
|
US20110185435 |
FLASH MEMORY STORAGE SYSTEM, AND CONTROLLER AND ANTI-FALSIFYING METHOD THEREOF
A flash memory storage system having a flash memory controller, a flash memory chip and a smart card chip is provided. The flash memory chip is configured to store security data. The flash memory... |
|
US20110153969 |
DEVICE AND METHOD TO CONTROL COMMUNICATIONS BETWEEN AND ACCESS TO COMPUTER NETWORKS, SYSTEMS OR DEVICES
A network security device and method for one way or secure communication are disclosed. At least one processor is connected to a higher level network port and a lower level network port, and is... |
|
US20100293392 |
SEMICONDUCTOR DEVICE HAVING SECURE MEMORY CONTROLLER
A secure memory controller includes a memory unit and a controller. The memory unit stores the information of the predetermined scenario in accordance with an application to be executed. The... |
|
US20090319772 |
IN-LINE CONTENT BASED SECURITY FOR DATA AT REST IN A NETWORK STORAGE SYSTEM
A network storage server receives multiple write requests from a set of clients via a network and internally buffers multiple data blocks written by the write requests. At a consistency point, the... |
|
US20090172331 |
Securing content for playback
A graphics engine may include a decryption device, a renderer, and a sprite or overlay engine, all connected to a display. A memory may have a protected and non-protected portions in one... |
|
US20070180210 |
Storage device for providing flexible protected access for security applications
A data storage apparatus comprising a storage medium having a plurality of physical memory locations referenced through logical block addresses, and a secure partition having a table including at... |
|
US20050177694 |
Protection of content stored on portable memory from unauthorized usage
A device for securely recording protected content to a portable memory, and for reading the protected content therefrom. The device includes a feature that makes it adapted to read or write... |
|
US20100058016 |
METHOD, APPARATUS AND SOFTWARE PRODUCT FOR MULTI-CHANNEL MEMORY SANDBOX
A method, apparatus, and software product allow signalling toward a multi-channel memory subsystem within an application processing architecture, and routing of that signalling via a single... |
|
US20150033062 |
APPARATUS AND METHOD FOR CONTROLLING CONTROLLABLE CLOCK SOURCE TO GENERATE CLOCK SIGNAL WITH FREQUENCY TRANSITION
A clock generator includes a controllable clock source and a frequency hopping controller. The controllable clock source generates a clock signal to a clock-driven device. The frequency hopping... |
|
US20080168247 |
Method and apparatus for controlling access to a data storage device
An apparatus comprises a data storage device, and a security partition in the data storage device containing information defining a time period in which a user is authorized to access data stored... |
|
US20080140969 |
METHOD AND SYSTEM FOR DIVIDING A HARD DISK DRIVE INTO MULTIPLE HOST ACCESS SPACES
Data storage device, system, and method for restricting host access to only one portion of a data storage device includes a storage device having a user space including a plurality of sectors and... |