摘要:
A system and method for managing simultaneous access to a scarce or serially re-usable resource by multiple process threads. A stationary queue is provided, including a wait counter for counting the cumulative number of threads that have been temporarily denied the resource; a satisfied counter for counting the cumulative number of threads that have been denied access and subsequently granted access to said resource; a sleep code routine responsive to the wait counter for generating a run identifier; and a wakeup code routine responsive to the satisfied counter for generating the run identifier.
摘要:
A system and method for managing simultaneous access to a scarce or serially re-usable resource by multiple process threads. A stationary queue is provided, including a wait counter for counting the cumulative number of threads that have been temporarily denied the resource; a satisfied counter for counting the cumulative number of threads that have been denied access and subsequently granted access to said resource; a sleep code routine responsive to the wait counter for generating a run identifier; and a wakeup code routine responsive to the satisfied counter for generating the run identifier.
摘要:
A communications apparatus is provided comprising a plurality of FIFO buffers, each with independent control and priority logic under software control for supporting different types of message traffic, both send and receive, such as comprise a multimedia server system. Processor software directs messages to specific, optimized FIFO buffers. Further, a system is provided including a plurality of nodes wherein a sending node specifies the communications path through the system, selecting specific FIFO buffers in each node for buffering its messages.
摘要:
Method, system and computer program product are provided for monitoring integrity of at least one of an executable module and an associated protected service provider (PSP) module, wherein the PSP module provides a protected service function to the executable module. A symbiont module is provided for checking integrity of at least one of the PSP module and the executable module, wherein the symbiont module comprises a separate module from the PSP module. The PSP module includes code for cross-checking integrity of the symbiont module, wherein the symbiont module checking and the PSP module cross-checking together monitor integrity of at least one of the executable module and the PSP module. Further, the protected service function can be divided into at least a first component and a second component, with the first component being implemented within the PSP module and the second component being implemented within the symbiont module.
摘要:
A system and method for controlling the operation of an adapter operable in a plurality of modes, such as I/O mode and memory mapped mode. A generic adapter access routine is initialized with global data objects as pointers to corresponding sets of alternative adapter functions, and the adapter is initialized to function in a first mode and the pointers mapped to a corresponding current set of adapter functions. Device driver code calls to global data objects are executed by reference to the current set of adapter functions. Responsive to a request to switch modes, the adapter is switched to a second mode and the pointers remapped to a corresponding second set of adapter functions, and execution of device driver code calls to the global data objects continues.
摘要:
A system and method for managing access by a user to a reusable resource. An integer pool is provided, along with program and hardware structures for obtaining an integer from the integer pool, for returning an integer to the integer pool. Responsive to the integer pool being empty, the user is waited. The integer pool includes a NEXT control structure from which a next integer is obtained for use and into which an integer is loaded upon being made available for reuse. The integer pool includes, for holding integers received from or to be provided to said NEXT control structure, (a) a LIFO stack or (b) a linked list by proxy. Reusable resources include data buffers, hardware status bits, logical connections and/or data channels.
摘要:
Apparatus, method and computer program product are provided for performing integrity checking of a relocated executable module loaded within memory by an operating system loader. A repeatable digital signature is generated by determining the load address of the executable module in memory, normalizing at least some content of the executable module in memory employing the load address of the module, and then performing integrity analysis on a digital section of the module's content, including the normalized content, thereby deriving the repeatable digital signature.
摘要:
A communications apparatus is provided comprising a plurality of FIFO buffers, each with independent control and priority logic under software control for supporting different types of message traffic, both send and receive, such as comprise a multimedia server system. Processor software directs messages to specific, optimized FIFO buffers. Further, a system is provided including a plurality of nodes wherein a sending node specifies the communications path through the system, selecting specific FIFO buffers in each node for buffering its messages.
摘要:
Encryption and decryption of data stored from a computing system to a storage medium is disclosed wherein the processing employs a non-accessible encryption key that is unique to the computing system. The unique encryption key can be embedded in non-removable hardware of the computing system or generated, e.g., from identification numbers ascertained from non-removable hardware of the computing system. Processing includes establishing the unique encryption key, encrypting data using the unique encryption key and storing the encrypted data to the storage medium without storing the unique encryption key on the storage medium. The storage medium can comprise any non-removable or removable storage medium, including for example a computer hard drive, floppy diskette, or recordable compact disk.
摘要:
Encryption and decryption of data stored from a computing system to a storage medium is disclosed wherein the processing employs a non-accessible encryption key that is unique to the computing system. The unique encryption key can be embedded in non-removable hardware of the computing system or generated, e.g., from identification numbers ascertained from non-removable hardware of the computing system. Processing includes establishing the unique encryption key, encrypting data using the unique encryption key and storing the encrypted data to the storage medium without storing the unique encryption key on the storage medium. The storage medium can comprise any non-removable or removable storage medium, including for example a computer hard drive, floppy diskette, or recordable compact disk.