会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 11. 发明授权
    • Method and apparatus for snoop stretching using signals that convey
snoop results
    • 使用传达窥探结果的信号进行窥探伸展的方法和装置
    • US5572703A
    • 1996-11-05
    • US203802
    • 1994-03-01
    • Peter MacWilliamsNitin V. SarangdharMatthew FischAmit Merchant
    • Peter MacWilliamsNitin V. SarangdharMatthew FischAmit Merchant
    • G06F12/08G06F13/14
    • G06F12/0831
    • A protocol and related apparatus for snoop stretching in a computer system having at least one requesting agent for issuing bus transaction requests and at least one snooping agent for monitoring transaction requests and issuing bus signals onto an external bus. The bus transactions are timed by a bus clock signal having a plurality of cycles. To indicate snoop stretching, during a first cycle a first snooping agent asserts both a HIT# bus signal and a HITM# bus signal together to indicate that the first snooping agent must delay assertion of valid snoop results for a predetermined snoop period. During a later cycle, to indicate the end of the snoop stretch, the first snooping agent deasserts the assertion of both the HIT# and HITM# signals together and asserts its valid snoop results. The HIT# and HITM# signals alone each represent valid snoop results. If the first snooping agent must continue delaying assertion of valid snoop results, then it reasserts both the HIT# and HITM# bus signals together for the predetermined snoop period. If a second snooping agent is ready to assert its valid snoop results, it will do so while the first snooping agent causes a snoop stretch, and will reassert its valid snoop results up to and including the cycle that the first snooping agent deasserts it snoop stretch and asserts its own valid snoop results.
    • 一种用于在具有发出总线事务请求的至少一个请求代理的计算机系统中的窥探扩展的协议和相关装置,以及用于监视事务请求和向总线信号发出总线信号的至少一个侦听代理。 总线事务由具有多个周期的总线时钟信号定时。 为了指示窥探伸展,在第一周期期间,第一窥探代理将HIT#总线信号和HITM#总线信号一起断言,以指示第一侦听代理必须在预定的窥探期间延迟有效窥探结果的断言。 在稍后的循环中,为了指示窥探伸展的结束,第一次窥探代理将HIT#和HITM#信号的断言声明为一致,并断言其有效的窥探结果。 HIT#和HITM#信号单独表示有效的窥探结果。 如果第一个窥探代理人必须继续延迟有效的窥探结果的断言,则在预定的窥探期间,它将HIT#和HITM#总线信号一起重新提供。 如果第二个侦听代理程序准备好声明其有效的侦听结果,则会在第一个侦听代理程序导致侦听扩展时执行此操作,并将重新发送其有效的侦听结果,直到并包括第一个侦听代理程序将其忽略的循环snoop stretch 并声明自己有效的窥探结果。
    • 18. 发明授权
    • Apparatus and method of handling race conditions in mesi-based
multiprocessor system with private caches
    • 在具有私有高速缓存的基于Mesi的多处理器系统中处理竞争条件的装置和方法
    • US5551005A
    • 1996-08-27
    • US201854
    • 1994-02-25
    • Nitin V. SarangdharWen-Hann WangMatthew Fisch
    • Nitin V. SarangdharWen-Hann WangMatthew Fisch
    • G06F12/08
    • G06F12/0808G06F12/0831
    • In a computer system having a plurality of processors with internal caches, a method for handling race conditions arising when multiple processors simultaneously write to a particular cache line. Initially, a determination is made as to whether the cache line is in an exclusive, modified, invalid, or shared state. If the cache line is in either the exclusive or modified state, the cache line is written to and then set to the modified state. If the cache line is in the invalid state, a Bus-Read-Invalidate operation is performed. However, if the cache line is in the shared state and multiple processors initiate Bus-Write-Invalidate operations, the invalidation request belonging to the first processor is allowed to complete. Thereupon, the cache line is sent to the exclusive state, data is updated, and the cache line is set to the modified state. The second processor receives a second cache line, updates this second cache line, and sets the second cache line to the modified state.
    • 在具有多个具有内部高速缓存的处理器的计算机系统中,一种用于处理当多个处理器同时写入特定高速缓存行时产生的竞争条件的方法。 首先,确定高速缓存行是否处于排他,修改,无效或共享状态。 如果缓存行处于独占状态或修改状态,则将高速缓存行写入并设置为修改状态。 如果缓存行处于无效状态,则执行总线读取无效操作。 然而,如果高速缓存行处于共享状态,并且多个处理器启动总线写入无效操作,则允许属于第一处理器的无效请求完成。 于是缓存行被发送到独占状态,数据被更新,高速缓存行被设置为修改状态。 第二处理器接收第二高速缓存行,更新第二高速缓存行,并将第二高速缓存行设置为修改状态。
    • 19. 发明授权
    • Apparatus and method for performing error correction in a
multi-processor system
    • 用于在多处理器系统中执行纠错的装置和方法
    • US5550988A
    • 1996-08-27
    • US205604
    • 1994-03-01
    • Nitin V. SarangdharKonrad K. Lai
    • Nitin V. SarangdharKonrad K. Lai
    • G06F11/14G06F13/36
    • G06F13/36G06F11/1402
    • In a multi-processor system having a first processor, a second processor, and a bus coupling the first processor to the second processor, a method for correcting an erroneous signal corresponding to the first processor while maintaining lock atomicity. When an erroneous transaction is detected, the first processor aborts that transaction and performs a retry. On the retry, an arbitration process arbitrates between the first processor and the second processor to determine which processor is granted access to the bus. If an error is detected during the arbitration process, an arbitration re-synchronization process is initiated. In the arbitration re-synchronization process, bus requests are de-asserted and then re-arbitrated. In the re-arbitration process, the first processor initiates its request ahead of the other processor in order to maintain lock atomicity.
    • 在具有第一处理器,第二处理器和将第一处理器耦合到第二处理器的总线的多处理器系统中,一种用于在保持锁原子性的同时校正与第一处理器相对应的错误信号的方法。 当检测到错误的事务时,第一处理器中止该事务并执行重试。 在重试时,仲裁过程在第一处理器和第二处理器之间进行仲裁以确定哪个处理器被授权访问总线。 如果在仲裁过程中检测到错误,则启动仲裁重新同步过程。 在仲裁重新同步过程中,总线请求被取消断言,然后重新仲裁。 在重新仲裁过程中,第一个处理器在另一个处理器之前发起其请求,以保持锁定原子性。
    • 20. 发明申请
    • PROTECTING A MEMORY DEVICE FROM BECOMING UNUSABLE
    • 保护存储设备免于不可用
    • US20150278003A1
    • 2015-10-01
    • US14229345
    • 2014-03-28
    • Nitin V. SarangdharSudhakar Otturu
    • Nitin V. SarangdharSudhakar Otturu
    • G06F11/07
    • G06F11/0787G06F11/073G06F11/0775
    • In an embodiment, a computing device may include a memory device that may be rendered unusable after a certain number of operations are performed on the memory device. The computing device may incorporate one or more techniques for protecting the memory device. Processing logic contained in the computing device may be configured to implement the techniques. The techniques may include, for example, acquiring a request to write or erase information stored in a memory device contained in a first computing device, saving the request for execution after a user visible event has been generated on the first computing device, generating the user visible event on the first computing device, and executing the saved request after the user visible event has been generated. In addition, the techniques may include reporting the request. The request may be reported to, for example, an anti-malware agent.
    • 在一个实施例中,计算设备可以包括可以在对存储器设备执行一定数量的操作之后使其不可用的存储器设备。 计算设备可以包括用于保护存储器设备的一种或多种技术。 包含在计算设备中的处理逻辑可以被配置为实现这些技术。 技术可以包括例如获取写入或擦除存储在包含在第一计算设备中的存储器设备中的信息的请求,在第一计算设备上已经生成用户可见事件之后保存执行请求,生成用户 在第一计算设备上的可见事件,以及在生成用户可见事件之后执行保存的请求。 此外,技术可以包括报告请求。 该请求可以被报告给例如反恶意软件代理。