Resource restriction
    1.
    发明授权

    公开(公告)号:US10193892B2

    公开(公告)日:2019-01-29

    申请号:US15116851

    申请日:2014-03-14

    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a restriction associated with a resource of the environment, a monitor engine to maintain resource utilization information, and a control engine to limit execution of the procedure based on the restriction and the resource utilization information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a restriction associated with a resource of the environment, receiving a procedure to access the set of data, ascertaining resource utilization information, and providing a view of the set of data based on the restriction and the resource utilization information.

    TRUSTED FUNCTION BASED DATA ACCESS SECURITY CONTROL
    5.
    发明申请
    TRUSTED FUNCTION BASED DATA ACCESS SECURITY CONTROL 审中-公开
    基于功能的数据访问安全控制

    公开(公告)号:US20160217295A1

    公开(公告)日:2016-07-28

    申请号:US14915971

    申请日:2013-10-31

    CPC classification number: G06F21/6218 G06F21/552 G06F21/6254

    Abstract: According to an example, trusted function based data access security control may include determining a restriction set by a first entity and related to access to and/or analysis related to data under the control of the first entity. A trusted function including meta-data that describes a transformation of the data may be ascertained. A determination may be made as to whether the meta-data of the trusted function matches the restriction related to the access to and/or analysis related to the data. In response to a determination that the meta-data of the trusted function matches the restriction, the trusted function may be executed to allow controlled access to the data by a second entity. In response to a determination that the meta-data of the trusted function does not match the restriction, execution of the trusted function may be prevented to prevent access to the data by the second entity.

    Abstract translation: 根据一个示例,基于信任功能的数据访问安全控制可以包括确定第一实体的限制集合并且与在第一实体的控制下与数据有关的访问和/或分析相关。 可以确定包括描述数据变换的元数据的可信函数。 可以确定信任功能的元数据是否与对与数据有关的访问和/或分析相关的限制进行匹配。 响应于可信功能的元数据与该限制匹配的确定,可以执行可信函数以允许第二实体对数据的受控访问。 响应于可信函数的元数据与限制不匹配的确定,可以防止可信函数的执行以防止第二实体访问数据。

    Memory system management
    6.
    发明授权

    公开(公告)号:US10701152B2

    公开(公告)日:2020-06-30

    申请号:US15573863

    申请日:2015-09-24

    Abstract: A memory system that is an example of the present disclosure comprises a memory fabric and an overlay. The memory fabric comprises: a network of memory components interconnected by optical interconnects, and memory address spaces of the memory components are aggregated and exposed as if the network were a single memory resource. The memory fabric further comprises router modules to implement steps of a fabric routing protocol to route memory-addressing requests along paths to destination memory components in the memory fabric. The overlay increases resiliency of the memory system and comprises overlay nodes to receive and forward memory-addressing requests from client programs and to implement steps of an overlay routing protocol to selectively control routing of received memory-addressing requests, to destination memory components, either along paths determined according to the fabric routing protocol or along alternative paths via overlay nodes.

    Semantic restriction
    7.
    发明授权

    公开(公告)号:US10192066B2

    公开(公告)日:2019-01-29

    申请号:US15125675

    申请日:2014-03-14

    Abstract: In one implementation, a data sharing system can comprise a trust engine to identify an environment that satisfies a level of trust, an access engine to request access to a set of data, a procedure engine to receive a procedure, a restriction engine to receive a semantic restriction associated with a semantic term of the environment, a tracker engine to track the procedure during execution, and a control engine to maintain execution of the procedure based on the restriction and trace information. In another implementation, a method for sharing a set of data can comprise validating an environment satisfies a level of trust, receiving a procedure to access the set of data, receiving a semantic restriction associated with a semantic term of the environment, tracing the procedure during execution, and providing a view of the set of data based on the restriction and a semantic mapping of trace information.

    COMMIT BASED MEMORY OPERATION IN A MEMORY SYSTEM

    公开(公告)号:US20180165165A1

    公开(公告)日:2018-06-14

    申请号:US15572996

    申请日:2015-07-31

    CPC classification number: G06F11/1474 G06F9/466 G06F9/467

    Abstract: A group of memory modules in a memory system receives a memory operation instruction comprising instructions on a memory operation and sends votes on the possibility to perform the memory operation to a memory coordinator module. The memory coordinator module receives votes and establishes a list of memory modules which have voted positively. The memory coordinator module verifies that the list of memory modules comprises all the memory modules in the group and that there is not another memory coordinator module detected by the memory coordinator module, instructs all the memory modules in the group to commit to the memory operation.

Patent Agency Ranking