Securing non-volatile memory regions
    4.
    发明授权
    Securing non-volatile memory regions 有权
    保护非易失性存储器区域

    公开(公告)号:US08516271B2

    公开(公告)日:2013-08-20

    申请号:US13046381

    申请日:2011-03-11

    IPC分类号: H04L9/14 H04L9/30

    摘要: Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

    摘要翻译: 公开了用于安全非易失性存储器区域的方法,装置和制品。 本文公开的示例性方法包括:使用第一密钥对来将与第一密钥对不同的第一密钥对和第二密钥对与过程相关联,以使得用于该过程的非易失性存储器的第一区域被固定,并且使用第二密钥对 密钥对以固定用于相同处理的非易失性存储器的第二区域,第二区域不同于第一区域。

    SECURING NON-VOLATILE MEMORY REGIONS
    5.
    发明申请
    SECURING NON-VOLATILE MEMORY REGIONS 有权
    保护非易失性存储区域

    公开(公告)号:US20120233472A1

    公开(公告)日:2012-09-13

    申请号:US13046381

    申请日:2011-03-11

    IPC分类号: G06F12/14

    摘要: Methods, apparatus and articles of manufacture to secure non-volatile memory regions are disclosed. An example method disclosed herein comprises associating a first key pair and a second key pair different than the first key pair with a process, using the first key pair to secure a first region of a non-volatile memory for the process, and using the second key pair to secure a second region of the non-volatile memory for the same process, the second region being different than the first region.

    摘要翻译: 公开了用于安全非易失性存储器区域的方法,装置和制品。 本文公开的示例性方法包括:使用第一密钥对来将与第一密钥对不同的第一密钥对和第二密钥对与过程相关联,以使得用于该过程的非易失性存储器的第一区域被固定,并且使用第二密钥对 密钥对以固定用于相同处理的非易失性存储器的第二区域,第二区域不同于第一区域。

    IDENTIFYING NETWORK COMMUNICATION PATTERNS
    6.
    发明申请
    IDENTIFYING NETWORK COMMUNICATION PATTERNS 有权
    识别网络通信模式

    公开(公告)号:US20150026318A1

    公开(公告)日:2015-01-22

    申请号:US14374804

    申请日:2012-04-24

    IPC分类号: H04L12/24 H04L12/26

    摘要: Examples of the present disclosure include methods, devices, and/or systems. Identifying network communication patterns can include analyzing a distributed computer program of a network, estimating virtual network communication traffic based on the analysis, and mapping the virtual network communication traffic to a physical network link. Identifying network communications patterns can also include identifying the network communication pattern and categorizing the physical communication network link based on an estimated communication intensity of the mapped communication traffic and the network communication pattern. Identifying network communication patterns can further include optimizing an energy used by the network based on the categorization.

    摘要翻译: 本公开的示例包括方法,设备和/或系统。 识别网络通信模式可以包括分析网络的分布式计算机程序,基于分析估计虚拟网络通信流量,以及将虚拟网络通信流量映射到物理网络链路。 识别网络通信模式还可以包括基于所估计的映射通信业务的通信强度和网络通信模式来识别网络通信模式并对物理通信网络链路进行分类。 识别网络通信模式还可以包括基于分类优化网络所使用的能量。

    Remote connection between intermediary device and computing device via central authority software
    9.
    发明授权
    Remote connection between intermediary device and computing device via central authority software 有权
    通过中央管理软件远程连接中间设备和计算设备

    公开(公告)号:US08291488B2

    公开(公告)日:2012-10-16

    申请号:US12305856

    申请日:2007-06-26

    IPC分类号: H04L29/06

    CPC分类号: H04L63/0272 H04L67/08

    摘要: Upon an intermediary device on a network being turned on, controlling system software at the intermediary device is booted such that no public network address is ever assigned to the intermediary device. The intermediary device sends a boot message over the network to central authority software running on one or more first computing devices on the network. The central authority software in response sends messages over the network to the intermediary device and to a second computing device on the network to establish a private tunnel with one another. The intermediary device and the second computing device establish the private tunnel with one another over the network. The intermediary device then opens a remote connection to the second computing device through the private tunnel so that peripherals connected to the intermediary device as if they were directly connected to the second computing device.

    摘要翻译: 在网络上的中间设备被打开时,启动中间设备处的系统软件,使得没有公共网络地址被分配给中间设备。 中间设备通过网络将引导消息发送到在网络上的一个或多个第一计算设备上运行的中央管理软件。 中央机构软件响应地通过网络将消息发送到中间设备和网络上的第二计算设备,以建立彼此的私有隧道。 中间设备和第二计算设备通过网络彼此建立私有隧道。 中间设备然后通过私有隧道打开到第二计算设备的远程连接,使得连接到中间设备的外围设备就好像直接连接到第二计算设备。

    SIMULATING AN APPLICATION
    10.
    发明申请
    SIMULATING AN APPLICATION 有权
    模拟应用

    公开(公告)号:US20110106519A1

    公开(公告)日:2011-05-05

    申请号:US12611213

    申请日:2009-11-03

    IPC分类号: G06F9/45

    摘要: One example embodiment is a method that simulates a sampling period of an application to collect execution counts of basic blocks and compute cycles per instruction (CPI) data. A non-sampling period of the application is simulated to collect execution counts of basic blocks, and a comparison of the execution counts collected during the sampling period is performed to the execution counts collected during the non-sampling period. Based on the comparison, a determination is made whether to estimate CPI for the basic blocks during the non-sampling period using the CPI data collected during the sampling period.

    摘要翻译: 一个示例性实施例是模拟应用程序的采样周期以收集基本块的执行计数并计算每个指令(CPI)数据的周期的方法。 模拟应用的非采样周期以收集基本块的执行计数,并且对在采样周期期间收集的执行计数执行在采样周期期间收集的执行计数的比较。 基于比较,确定在采样期间采集的CPI数据是否在非采样周期内估计基本块的CPI。