Data buffering technique in computer system
    1.
    发明授权
    Data buffering technique in computer system 失效
    计算机系统中的数据缓冲技术

    公开(公告)号:US5893926A

    公开(公告)日:1999-04-13

    申请号:US569528

    申请日:1995-12-08

    IPC分类号: G06F9/46 G06F13/10 G06F12/02

    CPC分类号: G06F9/544 G06F13/102

    摘要: A computer system executes an application that requires transfer of data to or from the computer system. The system responds to requests from the application, by allocating storage for a data buffer, verifying that the application is authorized to access the buffer, converting an address of the buffer utilized by the application to a corresponding system address and mapping the system buffer address to an index. The system also responds to a subsequent transmit or receive request from the application, by accessing the data buffer based on the index such that no storage allocation, address conversion, or access verification is required for the transmit or receive request after the transmit or receive request is made. The computer system includes a communications adapter at an input or output port and the data is transferred between the communications adapter and the buffer without any intermediary buffering. Thus, the transmit and receive requests are processed expeditiously.

    摘要翻译: 计算机系统执行需要将数据传送到计算机系统或从计算机系统传送的应用程序。 系统响应来自应用程序的请求,通过为数据缓冲区分配存储,验证应用程序是否有权访问缓冲区,将应用程序使用的缓冲区的地址转换为相应的系统地址,并将系统缓冲区地址映射到 一个索引。 该系统还通过基于索引访问数据缓冲器来响应来自应用的后续发送或接收请求,使得在发送或接收请求之后不需要发送或接收请求的存储分配,地址转换或访问验证 是做的 计算机系统包括在输入或输出端口处的通信适配器,并且数据在通信适配器和缓冲器之间传送,而无需任何中间缓冲。 因此,发送和接收请求被快速处理。

    Trainable rule-based computer file usage auditing system
    5.
    发明授权
    Trainable rule-based computer file usage auditing system 有权
    可训练的基于规则的计算机文件使用审计系统

    公开(公告)号:US07607176B2

    公开(公告)日:2009-10-20

    申请号:US10985989

    申请日:2004-11-12

    摘要: Embodiments of the present invention provide for flexible monitoring of content. The content at a client device can be monitored based on the use and actions performed by the client. In order to monitor the content at the client, a dependency is created between any recipient of the content and a monitor installed at the client device. For example, the content may be encrypted and, when the content is accessed by a potential recipient, the recipient may be required to request a key from the monitor. This activates the monitor to begin recording transaction data and events about the content's use, such as the recipient's identity and the type of actions performed. The monitor can be configured to passively monitor and record the use of the content at the client's device. In addition, the monitor can be configured to provide audit data that indicates the transaction data recorded to a server.

    摘要翻译: 本发明的实施例提供对内容的灵活监视。 客户端设备的内容可以根据客户端的使用和操作进行监控。 为了监控客户端的内容,在内容的任何收件人和安装在客户端设备上的监视器之间创建依赖关系。 例如,内容可以被加密,并且当内容被潜在接收者访问时,可能需要接收者从监视器请求密钥。 这将激活监视器以开始记录有关内容使用的事务数据和事件,例如收件人的身份和执行的操作类型。 监视器可以被配置为被动地监视和记录在客户端设备上使用内容。 此外,监视器可以配置为提供指示记录到服务器的交易数据的审计数据。

    Tamper resistance with pseudo-random binary sequence program interlocks
    7.
    发明授权
    Tamper resistance with pseudo-random binary sequence program interlocks 失效
    篡改电阻与伪随机二进制序列程序互锁

    公开(公告)号:US06789199B1

    公开(公告)日:2004-09-07

    申请号:US09500345

    申请日:2000-02-08

    IPC分类号: G06F1130

    CPC分类号: G06F21/123

    摘要: Tamper resistance is provided to avoid observation of the behavior of portions of software by calling a function exclusively available in one differentiated section of a processor and its peripherals and drivers from another differentiated section. A pseudo-random binary sequence generator is associated with each such differentiated section and incremented incident to the calling and performance of the function, respectively. The pseudo-random binary sequence values are compared prior to allowing or preventing further execution of the software. The comparison can be performed at any privilege level and a variation of the invention provides additional security by utilizing an additional privileged function to perform the comparison. An enhancement of the invention corrupts data or program files using a PRBS value at one privilege level and performs the inverse function to restore the data or program files at another privilege level with its own PRBS value.

    摘要翻译: 提供防篡改电阻以避免通过调用处理器的一个差分部分中独有的功能及其外围设备和驱动程序从另一个差异化部分来观察软件部分的行为。 伪随机二进制序列生成器与每个这样的差分部分相关联,并且分别对函数的调用和执行进行增加。 在允许或防止进一步执行软件之前比较伪随机二进制序列值。 可以在任何特权级别执行比较,并且本发明的变体通过利用额外的特权功能来执行比较来提供额外的安全性。 本发明的增强使用一个特权级别的PRBS值来破坏数据或程序文件,并且执行逆函数以具有其自己的PRBS值的另一特权级别恢复数据或程序文件。

    Method for allowing application program in computer system to access
device directly in exclusive mode by bypassing operating system and
blocking requests from other programs
    8.
    发明授权
    Method for allowing application program in computer system to access device directly in exclusive mode by bypassing operating system and blocking requests from other programs 失效
    允许计算机系统中的应用程序通过绕过操作系统并阻止来自其他程序的请求以独占模式直接访问设备的方法

    公开(公告)号:US5535416A

    公开(公告)日:1996-07-09

    申请号:US459014

    申请日:1995-06-01

    摘要: A data processing system gives an application running on the operating system exclusive ownership of a hardware device. The system is operable in two modes. In the first mode the application interacts with the hardware device by making use of the processing system. In this mode many layers of the processing system are involved and the interaction time with the hardware is slow and inconsistent. In the second mode, exclusive ownership of the hardware device is granted to the application by the driver. In this mode the application has direct access to the hardware device thus avoiding the involvement of the processing system layers. The application accesses and uses the driver through a low latency processor interface linked into the application program itself.

    摘要翻译: 数据处理系统使得在操作系统上运行的应用程序对硬件设备的独占所有权。 该系统可在两种模式下操作。 在第一种模式下,应用程序利用处理系统与硬件设备进行交互。 在这种模式下,涉及处理系统的许多层次,与硬件的交互时间缓慢而不一致。 在第二模式中,由驱动程序向该应用授予硬件设备的独占所有权。 在这种模式下,应用程序可以直接访问硬件设备,从而避免了处理系统层的卷入。 应用程序通过连接到应用程序本身的低延迟处理器接口访问和使用驱动程序。