会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明申请
    • System management mode using transactional memory
    • 使用事务性存储器的系统管理模式
    • US20080040524A1
    • 2008-02-14
    • US11503689
    • 2006-08-14
    • Vincent J. ZimmerSham DattaMichael A. Rothman
    • Vincent J. ZimmerSham DattaMichael A. Rothman
    • G06F13/24G06F13/32
    • G06F13/24
    • Embodiments of a system and method for servicing a hidden execution mode event in a multiprocessor computer system is described. A plurality of event handlers and shared memory resources are loaded or stored in a transactional memory space that is accessible to a hidden execution mode supported by each of a plurality of processors in the multiprocessor system. The event handlers are dispatched to different processors among the plurality of processors in response to the hidden execution mode event. A resource locking mechanism comprising a linked-list mechanism that stores entries consisting of work items to be executed by the processors, enables a specified resource of the one or more shared resources to be accessed by only one event handler at a time. The hidden execution mode event comprises a System Management Mode of a microprocessor, and the hidden execution mode event can be either a System Management Interrupt event or a Processor Management Interrupt event. The transactional memory can be either Hardware Transactional Memory or Software Transactional Memory.
    • 描述了用于在多处理器计算机系统中处理隐藏执行模式事件的系统和方法的实施例。 多个事件处理程序和共享存储器资源被加载或存储在可由多处理器系统中的多个处理器中的每一个支持的隐藏执行模式访问的事务存储器空间中。 响应于隐藏的执行模式事件,将事件处理程序调度到多个处理器中的不同处理器。 一种资源锁定机制,包括存储由待处理器执行的工作项组成的条目的链表机制,使一个或多个共享资源的指定资源一次只能由一个事件处理程序访问。 隐藏执行模式事件包括微处理器的系统管理模式,隐藏执行模式事件可以是系统管理中断事件或处理器管理中断事件。 事务内存可以是硬件事务内存或软件事务内存。
    • 4. 发明授权
    • Mechanism for booting a computer through a network
    • 通过网络引导计算机的机制
    • US06601166B1
    • 2003-07-29
    • US09471792
    • 1999-12-23
    • Mani AyyarSham DattaAndrew Fish
    • Mani AyyarSham DattaAndrew Fish
    • G06F9445
    • G06F9/4416
    • A mechanism is provided for booting a computer system that is capable of implementing different instruction set architectures, through a network. An embodiment of the invention includes a network controller implemented for a first ISA and a processor capable of implementing programs written in a second ISA as well as programs written in the first ISA. Following preliminary boot operations provided through non-volatile system memory, a network boot program provided by the network controller is implemented. The boot program requests the non-volatile system memory for an indication of the operating system to be loaded and generates a boot request for the indicated operating system. When the indicated operating system is written in the second ISA, the boot program loads the OS to a specified location in system memory and sends the processor into a mode suitable for executing the second ISA.
    • 提供了一种用于启动能够通过网络实现不同指令集架构的计算机系统的机制。 本发明的实施例包括为第一ISA实现的网络控制器和能够实现在第二ISA中写入的程序的处理器以及写入第一ISA的程序。 在通过非易失性系统存储器提供的初步引导操作之后,实现由网络控制器提供的网络引导程序。 引导程序请求非易失性系统存储器以指示要加载的操作系统,并为指示的操作系统生成引导请求。 当所指示的操作系统被写入第二ISA中时,引导程序将OS加载到系统存储器中的指定位置,并将处理器发送到适于执行第二ISA的模式。
    • 7. 发明申请
    • SECURITY MANAGEMENT IN MULTI-NODE, MULTI-PROCESSOR PLATFORMS
    • 多节点,多处理器平台的安全管理
    • US20090172806A1
    • 2009-07-02
    • US11968128
    • 2007-12-31
    • Mahesh S. NatuSham Datta
    • Mahesh S. NatuSham Datta
    • G06F7/04
    • G06F21/85
    • Multi-node and multi-processor security management is described in this application. Data may be secured in a TPM of any one of a plurality of nodes, each node including one or more processors. The secured data may be protected using hardware hooks to prevent unauthorized access to the secured information. Security hierarchy may be put in place to protect certain memory addresses from access by requiring permission by VMM, OS, ACM or processor hardware. The presence of secured data may be communicated to each of the nodes to ensure that data is protected. Other embodiments are described.
    • 本节介绍了多节点和多处理器的安全管理。 可以在多个节点中的任一个的TPM中确保数据,每个节点包括一个或多个处理器。 可以使用硬件钩来保护安全数据,以防止未经授权的访问安全信息。 可以通过要求VMM,OS,ACM或处理器硬件的许可来保护安全层次结构以保护某些存储器地址不被访问。 可以将安全数据的存在传送到每个节点以确保数据被保护。 描述其他实施例。
    • 10. 发明授权
    • Security management in multi-node, multi-processor platforms
    • 多节点,多处理器平台的安全管理
    • US08146150B2
    • 2012-03-27
    • US11968128
    • 2007-12-31
    • Mahesh S. NatuSham Datta
    • Mahesh S. NatuSham Datta
    • G06F7/04
    • G06F21/85
    • Multi-node and multi-processor security management is described in this application. Data may be secured in a TPM of any one of a plurality of nodes, each node including one or more processors. The secured data may be protected using hardware hooks to prevent unauthorized access to the secured information. Security hierarchy may be put in place to protect certain memory addresses from access by requiring permission by VMM, OS, ACM or processor hardware. The presence of secured data may be communicated to each of the nodes to ensure that data is protected. Other embodiments are described.
    • 本节介绍了多节点和多处理器的安全管理。 可以在多个节点中的任一个的TPM中确保数据,每个节点包括一个或多个处理器。 可以使用硬件钩来保护安全数据,以防止未经授权的访问安全信息。 可以通过要求VMM,OS,ACM或处理器硬件的许可来保护安全层级以保护某些存储器地址免受访问。 可以将安全数据的存在传送到每个节点以确保数据被保护。 描述其他实施例。