摘要:
Methods and apparatus are provided for issuing instructions in a processor having a pipeline. A method includes providing a loop buffer for holding program loop instructions and a register file for holding loop control parameters; in response to decoding of a first loop setup instruction, marking a first entry in the register file as a current entry and writing in the first entry loop control parameters represented in the first loop setup instruction; marking the current entry in the register file as an architectural entry in response to the first loop setup instruction being committed; and sending a loop bottom indicator down the pipeline with a loop bottom instruction.
摘要:
Techniques are described for providing a-priori information about the implication of a network device operator interaction with a network device, e.g., a software configuration or hardware change, to be performed on the network device before the interaction actually takes place. The network device operator is provided with information that may be used to make a decision whether to proceed with the interaction. For each logically distinct feature of a network device, the techniques generate a trigger outcome domain (TOD). Each TOD is defined to include a list of operator interactions that defines relevant events in the network device that may be triggerable by the operator interactions, a list of potential outcomes in the network based on the potential events in the network device, and a user interface to display the list of potential outcomes for the operator interactions prior to performing any of the interactions.
摘要:
A system and method of sending an e-mail message associated with a wireless device is provided. A request to forward or reply to an original e-mail message is sent from the wireless device to a server. The request contains one or more recipients and includes a message identifier of an original e-mail message. A portion indicator is provided for retrieving portions of the original e-mail message identified by the message identifier. An e-mail message is sent to the one or more recipients comprising any added user text and the one or more retrieved portions of the original e-mail message such that text of the original message that the user may not be aware is not forwarded to new recipients.
摘要:
A reader element is associated with an identity verification element. The reader element has a biometric input device and is configured, through enrollment of a biometric element is used to encrypt a character sequence associated with the identity verification element. In a verification phase subsequent to the enrollment, a user may be spared a step of providing the character sequence by, instead, providing the biometric element. Responsive to receiving the biometric element, the reader element may decrypt the character sequence and provide the character sequence to the identity verification element.
摘要:
Upon recognizing a loss of a first connection to a computing apparatus, such as a personal computer, a smart card reader may maintain an open session with a smart card and may associate an identity of the computing apparatus of the first connection with the open session. Some time later, the smart card reader may establish a second connection with a computing apparatus. The smart card reader may compare an identity of the computing apparatus of the second connection with the identity of the computing apparatus of the first connection. Responsive to determining that the identities do not match, the smart card reader may close the open session with the smart card. Responsive to determining that the identities do match, the smart card reader may maintain the open session with the smart card.
摘要:
Responsive to intercepting an outbound command, a command interceptor may, upon determining that the command is associated with a particular category of commands, transmit an anticipatory response to the source of the command, for example, to prematurely indicate that the command has met with success. Accordingly, a given application whose further execution is dependent upon the successful completion of the command may further execute earlier than would be the case if the given application was to await the transmission of the command, the generation of a response indicating success and the receipt of the response indicating success.
摘要:
A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution.
摘要:
A command destined for a smart card is received. If the command is of a state-altering type that places the smart card in a known state, it is relayed to a smart card reader unless the smart card is currently in the known state. If the command is a POWER OFF command, it is relayed to the smart card reader unless (i) the smart card is currently in the known state and (ii) within a predetermined time from receiving the command, a subsequent command of the state-altering type that places the smart card in the known state is received. If the command is not a POWER OFF command and is not of the state-altering type that places the smart card in the known state, it is relayed to the smart card reader. The command is discarded if not relayed to the smart card reader.
摘要:
A smart card reader is adapted to extract and store authentication data from a response APDU received from a smart card before generating a filtered response APDU, wherein the filtered response APDU does not include the authentication data. Beneficially, when the smart card reader transmits the filtered response APDU toward a destination, the biometric template data is less susceptible to interception, thereby providing a more secure solution.
摘要:
A user interface manager, interposed between a Windows service and user interface modules that communicate with the Windows service in distinct system status scenarios, can record interaction between the Windows service and each of the user interface modules. The recorded interaction, along with information collected from the user interface modules, can be used in conjunction so that user interaction with a first one of the user interface modules may continue with a second one of the user interface modules after a switch from one system status (e.g., logged on) to another system status (e.g., locked). Alternatively, responsive to the switch from one system status to another system status the user interface manager may simply stop the executing user interface module so that the interaction may be started over in the new system status.