会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明授权
    • Method of executing perform locked operation instructions for supporting
recovery of data consistency if lost due to processor failure, and a
method of recovering the data consistency after processor failure
    • US5895494A
    • 1999-04-20
    • US924890
    • 1997-09-05
    • Casper Anthony ScalziKenneth Ernest Plambeck
    • Casper Anthony ScalziKenneth Ernest Plambeck
    • G06F11/22G06F12/00
    • G06F11/2289
    • Provides a processor method of executing instances of a Perform Locked Operation (PLO) instruction for enabling a recovery of the consistency of a resource unit being changed by a PLO instance when processor failure occurs anywhere during execution of the PLO instance. The method uses a PLO save area for each processor in a computer system capable of executing PLO instructions. Each PLO save area has a resource-inconsistency (RI) indicator having an RI state and a non-RI state, and stores the function code (FC) of the PLO instance. The RI state indicates that the resource is in a non-usable potentially inconsistent state, and the non-RI state indicates the resource is in the consistent state and may be used. A processor executing a PLO instance writes into its PLO save area all resource addresses where a change is to be made in the resource unit, and also writes in its PLO save area all operand values which will be used to change the resource at the associated addresses. After the processor has successfully written all of these addresses and associated operand data values into its PLO save area, the processor sets its RI indicator to the RI state, and then stores into the resource unit the data values stored in its PLO save area at the resource addresses also stored in its PLO save area, according to the FC also stored therein. After completing all changes in the resource, the processor sets its RI indicator to the non-RI (resource consistent) state. If the processor should ever fail while executing a PLO instance, it signals its failing condition to the system. Then, a RCR method is executed by any operational processor (acting as a RCR processor) to recover the consistency of the resource unit. The RCR method uses the state of the RI indicator with the failed processor's PLO save area, the FC stored therewith, and the content of the failed processor's PLO save area to restore the consistency of the resource unit.
    • 2. 发明授权
    • Processor associated blocking symbol controls for serializing the
accessing of data resources in a computer system
    • US5895492A
    • 1999-04-20
    • US864585
    • 1997-05-28
    • Steven Jay GreenspanCasper Anthony ScalziKenneth Ernest Plambeck
    • Steven Jay GreenspanCasper Anthony ScalziKenneth Ernest Plambeck
    • G06F9/46G06F12/00
    • G06F9/526
    • Provides a processor CLE (CPU lock element) for each processor in a protected storage in a multi-processor computer system. Each CLE contains a blocking symbol field (called herein a PLT, program lock token, field), a lock field H, and a wait field W which is used to chain plural CLEs currently having the same blocking symbol. When the lock field H is set to a lock held state, it indicates the associated processor has exclusive rights to access a data resource unit associated with the blocking symbol in the CLE entry. When the wait field in a lock entry contains a pointer to another lock entry and the H field in the lock entry indicates a not held state, the associated processor is waiting for the resource and cannot further execute its PLO instance until it later gets set to the lock state, which is done by the processor of the prior CLE in the chain when it completes execution of its PLO instance. Each PLO instruction also has operand fields, and a function code (FC). The FC controls the manner of processing done by the PLO instance on its operands. Blocking symbols are specified by software to enable the software to utilize hardware enforced serialization of multi-processor accesses simultaneously requested for accessing the same data resource in the computer system. The plural processors may simultaneously, and at any time, initiate PLO instances for the same or different blocking symbols. When different processors simultaneously execute PLO instances having different blocking symbols, the processors may execute in parallel without conflict. But if the different processors simultaneously execute PLO instances having the same blocking symbol, the processors cannot execute in parallel without potential conflict, and the processors must serialize the execution of their PLO instances for accessing the same resource. In the latter case, their CLEs are chained through pointers in wait fields of the CLEs.
    • 3. 发明授权
    • Blocking symbol control in a computer system to serialize accessing a
data resource by simultaneous processor requests
    • 阻止计算机系统中的符号控制,以通过同时处理器请求序列化访问数据资源
    • US5893157A
    • 1999-04-06
    • US864402
    • 1997-05-28
    • Steven Jay GreenspanCasper Anthony ScalziKenneth Ernest Plambeck
    • Steven Jay GreenspanCasper Anthony ScalziKenneth Ernest Plambeck
    • G06F15/16G06F9/46G06F12/00G06F15/177
    • G06F9/52
    • PLO (perform locked operation) instructions containing blocking symbols are executed on each of multiple processors in a computer system to control coherence in data structures which may be changed by any of multiple processors in a computer system. The blocking symbol is extracted from a PLO instruction instance when invoked by its executing processor. Then the processor hashes the blocking symbol using hardware-microcode (H-M) to generate the location of a lock field in protected storage. The PLO instruction's blocking symbol is associated with a computer resource unit by software providing the PLO instruction, and the blocking symbol then associates the resource with a protected lock through the hashing operation on the blocking symbol. A processor must obtain the lock for a blocking symbol before the executing PLO instruction instance is allowed to make access and change the resource unit associated with the blocking symbol. The blocking symbol controls the PLO operations by serializing simultaneously PLO instruction access requests being made by multiple processors to the same resource unit using the same blocking symbol to allow only one PLO instruction instance to have exclusive access to the resource at a time.
    • 在计算机系统中的多个处理器中的每一个上执行包含阻塞符号的PLO(执行锁定操作)指令,以控制可由计算机系统中的多个处理器中的任何一个处理器改变的数据结构中的一致性。 当由其执行的处理器调用时,从PLO指令实例中提取阻塞符号。 然后,处理器使用硬件微码(H-M)对阻塞符号进行散列,以产生受保护存储中锁定字段的位置。 PLO指令的阻塞符号通过提供PLO指令的软件与计算机资源单元相关联,然后阻塞符号通过对阻塞符号的哈希操作将资源与受保护的锁相关联。 在允许执行的PLO指令实例进行访问并更改与阻塞符号相关联的资源单元之前,处理器必须获得锁定符号的锁定。 阻塞符号通过使用相同的阻塞符号将多个处理器进行的PLO指令访问请求同时序列化到相同的资源单元来控制PLO操作,以允许一次只有一个PLO指令实例对资源进行独占访问。
    • 4. 发明授权
    • Method utilizing a set of blocking-symbol resource-manipulation
instructions for protecting the integrity of data in noncontiguous data
objects of resources in a shared memory of a multiple processor
computer system
    • 利用一组阻塞符号资源操作指令来保护多处理器计算机系统的共享存储器中资源的非连续数据对象中的数据完整性的方法
    • US6128710A
    • 2000-10-03
    • US92442
    • 1998-06-05
    • Steven Jay GreenspanKenneth Ernest PlambeckCasper Anthony Scalzi
    • Steven Jay GreenspanKenneth Ernest PlambeckCasper Anthony Scalzi
    • G06F9/46G06F9/30
    • G06F9/526G06F9/52
    • Six instructions for the manipulation of discontinuous memory locations in a computer memory are described. They are: Compare and Load (CL), Compare and Swap (CS), Double Compare and Swap (DCS), Compare and Swap and Store (CSST), Compare and Swap and Double Store (CSDST), and Compare and Swap and Triple Store (CSTST). In each instruction a processor associates a programming-specified blocking symbol with a lock not accessible to software. The lock is used by any of these instructions only during its single instance of instruction execution, and the lock is made available (unlocked) at the end of each instance to then enable another blocking-symbol instruction instance to use the lock, thereby serializing concurrent multiple processor requests for accessing the same resource. Programming associates resources in a system with the unique blocking symbols. Each instance of these instructions executes an operand earlier prepared from a data value taken from the resource.. The data value is checked for change during the instance of execution when equality indicates no change since its preparation. These blocking-symbol instructions significantly increase the computer's speed of changing noncontiguous locations in a resource, compared to the time needed by software-protocol locks which must operate over a plurality of instances to make corresponding changes in a resource.
    • 描述了用于操纵计算机存储器中不连续存储器位置的六个指令。 它们是:比较和加载(CL),比较和交换(CS),双重比较和交换(DCS),比较和交换和存储(CSST),比较和交换和双存储(CSDST),以及比较和交换和三重 商店(CSTST)。 在每个指令中,处理器将编程指定的阻塞符号与软件无法访问的锁相关联。 只有在执行指令的单个实例期间,这些指令才被使用,并且锁定在每个实例结束时可用(未锁定),然后允许另一个阻塞符号指令实例使用该锁定,从而序列化并发 多个处理器请求访问相同的资源。 编程将系统中的资源与唯一的阻塞符号相关联。 这些指令的每个实例都执行从资源获取的数据值更早准备的操作数。在执行的实例中检查数据值以进行更改,当相等性表示自其准备以来没有更改。 与必须在多个实例上操作以进行资源的相应更改的软件协议锁相比,这些阻塞符号指令显着地增加了计算机改变资源中不连续位置的速度。
    • 5. 发明授权
    • Authority reduction and restoration method providing system integrity
for subspace groups and single address spaces during program linkage
    • 权限减少和恢复方法在程序链接期间为子空间组和单个地址空间提供系统完整性
    • US5745676A
    • 1998-04-28
    • US566557
    • 1995-12-04
    • Stephen James HobsonKenneth Ernest Plambeck
    • Stephen James HobsonKenneth Ernest Plambeck
    • G06F9/46G06F9/48G06F12/14G06F11/00
    • G06F9/4843G06F12/1475G06F9/468G06F12/1483
    • Provides data and program integrity in a computer system by guarding against malicious program operation when using the Branch In Subspace Group instruction (BSG) of the S/390 computer architecture. System integrity is ensured by providing a controlled target space (a base space) and branch address during a BSG transfer of control (branch) from a subspace, and a different PSW key mask (PKM) for the base space than for subspaces. More specifically, (1) the PKM is reduced and a new PSW access key is set during a BSG branch from the base space to a subspace, (2) the original PKM and access key and also a return address are saved in a secure data area during the same branch, and (3), during a branch from a subspace, the original PKM and access key are restored, and the branch is made to the return address (the controlled branch address) in the base space. The method is extended to apply to a single address space by a novel Branch and Set Authority instruction (BSA) that, when executed in a base-authority state, saves a return address and base authority in a secure data area and sets a reduced-authority state; and, when executed in the reduced-authority state, branches to the saved return address, restores the saved base authority, and sets the base-authority state.
    • 在使用S / 390计算机架构的分支子空间组指令(BSG)时,通过防范恶意程序操作,在计算机系统中提供数据和程序完整性。 通过在从子空间的控制(分支)的BSG传送期间提供受控的目标空间(基本空间)和分支地址以及用于基本空间的不同的PSW密钥掩码(PKM)而不是子空间来确保系统完整性。 更具体地说,(1)减少PKM,并且在从基本空间到子空间的BSG分支期间设置新的PSW访问密钥,(2)原始PKM和访问密钥以及返回地址被保存在安全数据中 在同一分支中的区域,以及(3)在从子空间的分支中恢复原始PKM和访问密钥,并将分支作为基本空间中的返回地址(受控分支地址)。 该方法被扩展为通过新的分支和设定权限指令(BSA)应用于单个地址空间,当在基本权限状态下执行时,将返回地址和基本权限保存在安全数据区域中, 权威状态 并且当以减少授权状态执行时,分支到保存的返回地址,恢复保存的基本权限,并设置基本权限状态。