-
公开(公告)号:US20180365177A1
公开(公告)日:2018-12-20
申请号:US15623960
申请日:2017-06-15
IPC分类号: G06F13/16
CPC分类号: G06F13/1684 , G06F13/1647
摘要: A processor implemented method for spreading data traffic across memory controllers with respect to conditions is provided. The processor implemented method includes determining whether the memory controllers are balanced. The processor implemented method includes executing a conditional spreading with respect to the conditions when the memory controllers are determined as unbalanced. The processor implemented method includes executing an equal spreading when the memory controllers are determined as balanced.
-
公开(公告)号:US09288051B2
公开(公告)日:2016-03-15
申请号:US13652027
申请日:2012-10-15
发明人: Todd W. Arnold , Elizabeth A. Dames , Thomas J. Dewkett , Carsten D. Frehr , Michael J. Kelly , Kenneth B. Kerr , Richard V. Kisley , Eric D. Rossman , Eric B. Smith
CPC分类号: H04L9/0897
摘要: According to one embodiment, a method for implementing computer security is provided. The method includes creating a token and populating a payload section of the token with key material and selecting a wrapping method that specifies how the key material is securely bound to key control information, wherein a structure of the key control information in the token is independent of the wrapping method. The method also includes wrapping the key material and binding key control information to the key material in the token, wherein the key control information includes information relating to usage and management of the key material.
摘要翻译: 根据一个实施例,提供了一种用于实现计算机安全性的方法。 该方法包括使用密钥材料创建令牌并填充令牌的有效载荷部分,并且选择指定密钥材料如何安全地绑定到密钥控制信息的包装方法,其中令牌中的密钥控制信息的结构独立于 包装方法。 该方法还包括将密钥材料和密钥控制信息绑定到令牌中的密钥材料,其中密钥控制信息包括与密钥材料的使用和管理有关的信息。
-
公开(公告)号:US20130039495A1
公开(公告)日:2013-02-14
申请号:US13652027
申请日:2012-10-15
发明人: Todd W. Arnold , Elizabeth A. Dames , Thomas J. Dewkett , Carsten D. Frehr , Michael J. Kelly , Kenneth B. Kerr , Richard V. Kisley , Eric D. Rossman , Eric B. Smith
IPC分类号: H04L9/00
CPC分类号: H04L9/0897
摘要: According to one embodiment, a method for implementing computer security is provided. The method includes creating a token and populating a payload section of the token with key material and selecting a wrapping method that specifies how the key material is securely bound to key control information, wherein a structure of the key control information in the token is independent of the wrapping method. The method also includes wrapping the key material and binding key control information to the key material in the token, wherein the key control information includes information relating to usage and management of the key material.
摘要翻译: 根据一个实施例,提供了一种用于实现计算机安全性的方法。 该方法包括使用密钥材料创建令牌并填充令牌的有效载荷部分,并且选择指定密钥材料如何安全地绑定到密钥控制信息的包装方法,其中令牌中的密钥控制信息的结构独立于 包装方法。 该方法还包括将密钥材料和密钥控制信息绑定到令牌中的密钥材料,其中密钥控制信息包括与密钥材料的使用和管理有关的信息。
-
公开(公告)号:US10684968B2
公开(公告)日:2020-06-16
申请号:US15623960
申请日:2017-06-15
IPC分类号: G06F13/16
摘要: A processor implemented method for spreading data traffic across memory controllers with respect to conditions is provided. The processor implemented method includes determining whether the memory controllers are balanced. The processor implemented method includes executing a conditional spreading with respect to the conditions when the memory controllers are determined as unbalanced. The processor implemented method includes executing an equal spreading when the memory controllers are determined as balanced.
-
-
-