Match
|
Document |
Document Title |
|
9043560 |
Distributed cache coherency protocol
Systems, methods, and other embodiments associated with a distributed cache coherency protocol are described. According to one embodiment, a method includes receiving a request from a requester... |
|
9043612 |
Protecting visible data during computerized process usage
Embodiments of the present invention provide an approach for protecting visible data during computerized process usage. Specifically, in a typical embodiment, when a computerized process is... |
|
9037813 |
Data accessing method for flash memory storage device having data perturbation module, and storage system and controller using the same
A data accessing method, and a storage system and a controller using the same are provided. The data accessing method is suitable for a flash memory storage system having a data perturbation... |
|
9037804 |
Efficient support of sparse data structure access
Method and apparatus to efficiently organize data in caches by storing/accessing data of varying sizes in cache lines. A value may be assigned to a field indicating the size of usable data stored... |
|
9038188 |
Protecting data stored in a chip card interface device in the event of compromise
A chip card interface device (CCID) is configured for protecting data stored at the CCID in the event of a compromise. The CCID has a housing and a compromise detection system including one or... |
|
9037825 |
Write horizon data management
Conditions are enforced to prevent unintended deletion of data stored by a data storage system. For example, to delete a collection of data, a condition on the collection of data's size may be... |
|
9037796 |
System and method for optimizing data remanence over hybrid disk clusters using various storage technologies
A method is implemented in a computer infrastructure having computer executable code tangibly embodied on a computer readable storage medium having programming instructions. The programming... |
|
9037823 |
Protecting IAT/EAT hooks from rootkit attacks using new CPU assists
The present disclosure provides systems and methods for hardware-enforced protection from malicious software. A device may include at least a security validator module and a security initiator... |
|
9037778 |
Method and apparatus to interface semiconductor storage device and host to provide performance throttling of semiconductor storage device
A method and apparatus to interface a semiconductor storage device and a host in order to provide performance throttling of the semiconductor storage device. In the method, the semiconductor... |
|
9038077 |
Data transfer protection in a multi-tasking modeling environment
A system for providing model level protection for resources holding data accessed by multiple tasks in a model is discussed. The protection occurs at the model level so that the protection... |
|
9032174 |
Information processing apparatus for restricting access to memory area of first program from second program
A processor determines whether a first program is under execution when a second program is executed, and changes a setting of a memory management unit based on access prohibition information so... |
|
9032163 |
Data access management
Apparatus, systems, and methods may operate to assert a first semi-exclusive write lock with respect to a storage medium area by storing lock information when assertion of another semi-exclusive... |
|
9032168 |
Memory management methods and systems for mobile devices
Memory management methods and systems for mobile devices are provided. A memory usage of a memory is monitored by a built-in memory management component of an OS of the device and a user-oriented... |
|
9032166 |
Memory arbitration system and method having an arbitration packet protocol
A memory hub and method for transmitting a read response on a data path of a memory hub interposed between a transmitting memory hub and a receiving memory hub. An arbitration packet including... |
|
9032052 |
Deployment of a driver or an application on a client device having a write-filter
The deployment of a driver or an application on a client device having a write-filter is described. A deployment configuration file is obtained, wherein the deployment configuration file includes... |
|
9026756 |
Memory device with copyright protection
According to one embodiment, a memory device includes a semiconductor memory, a memory controller which controls the semiconductor memory according to a request from outside the device, a radio... |
|
9026757 |
Non-volatile memory programming data preservation
A system and methods for programming a set of data onto non-volatile memory elements, maintaining copies of the data pages to be programmed, as well as surrounding data pages, internally or... |
|
9026755 |
Content control systems and methods
What is disclosed is a control system which includes an interface configured to receive a content request from a request source wherein the content request identifies content stored on a storage... |
|
9021202 |
Delivering secured media using a portable memory device
In some embodiments an interface of a portable memory device is used to store content information in a hidden memory region of the portable memory device. The interface is also used to store... |
|
9021421 |
Read and write barriers for flexible and efficient garbage collection
Described herein are techniques to provide read and write barriers for flexible and efficient garbage collection. A memory heap is split into pages. Each page is aligned to an address that is a... |
|
9015436 |
Performing an atomic operation without quiescing an interconnect structure
In one embodiment, the present invention includes a method for receiving a lock message for an address in a processor from a quiesce master of a system. This lock message indicates that a... |
|
9015840 |
Portable media system with virus blocker and method of operation thereof
A portable media system with a host computer system and method of operation thereof includes: accessing a public partition of the portable media system for a virus blocker for activation on the... |
|
9015198 |
Method and apparatus for large scale data storage
A logical apparatus and associated methods provide highly scalable and flexible data storage in a network of computers. The apparatus provides flexible organizational and access control mechanisms... |
|
9015439 |
Event lock storage device
A system and method are disclosed for an event lock storage device. The storage device includes a user partition and an event partition (which may be associated with an event). The storage device... |
|
9015432 |
Establishing a mapping to a virtual disk
A system, computer program product, and computer implemented method for mapping a Virtual machine (VM) drive to underlying storage, the method comprising locating a signature for a disk mounted to... |
|
9015437 |
Extensible hardware device configuration using memory
The present disclosure provides a system and method for implementing extensible hardware configuration using memory. A memory containing an Info Block is provided. The Info Block contains a set of... |
|
9015438 |
System and method for achieving enhanced performance with multiple networking central processing unit (CPU) cores
The present disclosure discloses a method and network device for achieving enhanced performance with multiple CPU cores in a network device having a symmetric multiprocessing architecture. The... |
|
9009432 |
Storage system effectively managing a capacity for remote copy
In one of the storage control apparatuses in the remote copy system which performs asynchronous remote copy between the storage control apparatuses, virtual logical volumes complying with Thin... |
|
9009386 |
Systems and methods for managing read-only memory
A system includes a memory device including a real memory and a tracking mechanism configured to track relationships between multiple virtual memory addresses and real memory. The system further... |
|
9003137 |
Interface systems and methods for accessing stored data
A modular data and storage management system. The system includes a time variance interface that provides for storage into a storage media of data that is received over time. The time variance... |
|
9003116 |
Protected mode for global platform compliant smart cards
A multiple application smart card (102) uses hardware firewalls (130) and an internal communications scheme to isolate applications from different service providers. A first application (116) from... |
|
9003161 |
Systems and methods for managing read-only memory
A first virtual memory address is mapped to a real memory in a memory device, and a second virtual memory address is mapped to the real memory. Here, the first virtual memory address is authorized... |
|
9003146 |
Managing memory of a computer
A method for managing data in a memory of a computer. The method includes the steps of: prohibiting a specified memory area in a memory from being accessed temporarily or intermittently; and... |
|
9003147 |
Electronic device and save data recording method
A virtual capacity acquisition unit acquires a size of virtual capacity of a save data area from an application. A storage capacity acquisition unit acquires a size of save data of the... |
|
9003111 |
Methods and apparatus providing high-speed content addressable memory (CAM) search-invalidates
Embodiments of a Content Addressable Memory (CAM) enabling high-speed search and invalidate operations and methods of operation thereof are disclosed. In one embodiment, the CAM includes a CAM... |
|
9003148 |
Microcomputer and method for controlling memory access
A microcomputer includes a CPU, a protection information storage configured to store memory protection information specifying an access permission or a prohibited state to a memory space by a... |
|
8996848 |
Less-secure processors, integrated circuits, wireless communications apparatus, methods and processes of making
An integrated circuit (122) includes an on-chip boot ROM (132) holding boot code, a non-volatile security identification element (140) having non-volatile information determining a less secure... |
|
8996806 |
System and method for auditing memory cards
A system and method for auditing memory cards. A memory card is received in a card reader in communication with a computing device. The memory card is scanned utilizing a computing device. A... |
|
8996797 |
Dense tree volume metadata update logging and checkpointing
The embodiments described herein are directed to efficient logging and checkpointing of metadata managed by a volume layer of a storage input/output (I/O) stack executing on one or more nodes of a... |
|
8996825 |
Judgment apparatus, judgment method, and recording medium of judgment program
A judgment apparatus includes a processor that executes a procedure, the procedure including obtaining a plurality of pieces of data having a certain relationship with a specific number or more of... |
|
8990487 |
Semiconductor memory card access apparatus, a computer-readable recording medium, an initialization method, and a semiconductor memory card
A predetermined number of erasable blocks positioned at a start of a volume area in a semiconductor memory card are provided so as to include volume management information. A user area following... |
|
8990542 |
Efficient metadata protection system for data storage
A method for protecting page-level metadata in a storage system is provided. The method includes providing in a page table first protection data, receiving a command to read data from a page of... |
|
8990394 |
System and method for providing session-level access management of access requests to a redirected device from a predetermined session
Managing access requests to a device is provided. The operations may include determining that a device stack corresponds to the device that is remote to the server and is connected locally to a... |
|
8990522 |
Digital signal processing data transfer
A technique for transferring data in a digital signal processing system is described. In one example, the digital signal processing system comprises a number of fixed function accelerators, each... |
|
8984245 |
Memory protection unit and method for controlling an access to memory device
A memory protection unit includes at least a first access control unit and a second access control unit programmed for controlling an access to a memory device. Further a method to operate a... |
|
8977811 |
Scalable schedulers for memory controllers
Methods and apparatus to improve throughput and efficiency in memory devices are described. In one embodiment, a memory controller may include scheduler logic to issue read or write requests to a... |
|
8972679 |
Storage device in a locked state
A method for managing a storage device including identifying a lock timing for the storage device when coupling to a device, transitioning the storage device into a locked state in response to... |
|
8971144 |
Hardware write-protection
A system for providing write-protection functionality to a memory device includes: a memory device including configurable registers controlling write and erase operations in the memory device; a... |
|
8972647 |
Kernel memory locking for systems that allow over-commitment memory
Provided are techniques for allocating logical memory corresponding to a logical partition in a computing system; generating a S/W PFT data structure corresponding to a first page of the logical... |
|
8966021 |
Composable machine image
A computer system image is executed on a computing node over a network. A system specification file transmitted over the network specifies the computer system image by specifying components of the... |