Parallel run-length decoder
    1.
    发明授权
    Parallel run-length decoder 失效
    并行游程解码器

    公开(公告)号:US4152697A

    公开(公告)日:1979-05-01

    申请号:US713544

    申请日:1976-08-11

    摘要: System and method for parallel decoding of character data in run length format to produce data in dot matrix form for presentation to a display device. The data for successive runs is stored in registers and processed in parallel to provide address data for memory devices programmed to deliver predetermined output data patterns in response to the address data.

    摘要翻译: 用于以游程长度格式并行解码字符数据的系统和方法以产生用于呈现给显示设备的点阵形式的数据。 用于连续运行的数据被存储在寄存器中并且被处理以提供编程为响应于地址数据传送预定输出数据模式的存储器件的地址数据。

    High resolution character generator
    2.
    发明授权
    High resolution character generator 失效
    高分辨率字符发生器

    公开(公告)号:US4079458A

    公开(公告)日:1978-03-14

    申请号:US713545

    申请日:1976-08-11

    CPC分类号: G09G5/42 G06K15/128 G09G5/24

    摘要: High resolution character generator for producing rows of characters to be scanned on a display medium. Input data defining characters to be printed in ordered rows of text is sorted to provide specifications for the characters which being on each successive scan line. These specifications are stored initially in an input buffer, and specifications for characters which have been partially printed in a previous scan line are stored in an active character buffer. For each scan line, the character specifications are read first from the active character buffer and then from the input buffer until an end of line specifier is reached. For each character specification received, a font memory containing data defining the characters is cycled. The data from the font memory is decoded and presented to the display medium on a line by line basis.

    摘要翻译: 用于产生要在显示介质上扫描的字符行的高分辨率字符发生器。 定义要按有序行文字打印的字符的输入数据进行排序,以便为每个连续扫描行上的字符提供规格。 这些规范最初存储在输入缓冲器中,并且已经部分地打印在先前扫描行中的字符的规格被存储在活动字符缓冲器中。 对于每条扫描线,首先从活动字符缓冲区读取字符规格,然后从输入缓冲区读取字符规格,直到到达行尾说明符。 对于接收到的每个字符规范,循环包含定义字符的数据的字体存储器。 来自字体存储器的数据被解码并逐行呈现给显示介质。

    Dynamic fine-grained dependency analysis for a functional language
    3.
    发明授权
    Dynamic fine-grained dependency analysis for a functional language 失效
    功能语言的动态细粒度依赖性分析

    公开(公告)号:US5940619A

    公开(公告)日:1999-08-17

    申请号:US738150

    申请日:1996-10-25

    IPC分类号: G06F9/44 G06F9/45

    摘要: In a computerized method, a computer program is analyzed while the program is interpreted. The program is expressed in a first memory as input values and functions. Some of the input values are complex values which can have a plurality of component values. Each function operates on combinations of the input values and the functions of the program. The program is interpreted in a processor connected to the first memory. The processor is also connected to a second memory to store result values produced during the interpretation. Selected input values, components of the complex values, and functions are named only if the selected values, components, and functions are necessary to produce a selected result value. For each function of the program, the function which is interpreted, the input values on which the function depends, and the result value produced by the function during interpretation, are recorded in the second memory to dynamically perform a precise dependency analysis of the program.

    摘要翻译: 在计算机化方法中,在解释程序时分析计算机程序。 该程序在第一个存储器中表示为输入值和函数。 一些输入值是可以具有多个分量值的复数值。 每个功能按照程序的输入值和功能的组合进行操作。 该程序在连接到第一存储器的处理器中解释。 处理器还连接到第二存储器以存储在解释期间产生的结果值。 选定的输入值,复数值的组成部分和功能仅在选定的值,组件和功能需要产生选定的结果值时进行命名。 对于程序的每个功能,解释的功能,功能所依赖的输入值和解释期间由功能产生的结果值被记录在第二存储器中以动态地执行程序的精确的依赖性分析。

    Method and apparatus for end-to-end encryption of a data packet in a
computer network
    4.
    发明授权
    Method and apparatus for end-to-end encryption of a data packet in a computer network 失效
    用于计算机网络中的数据分组的端到端加密的方法和装置

    公开(公告)号:US5594869A

    公开(公告)日:1997-01-14

    申请号:US432331

    申请日:1995-05-01

    IPC分类号: H04L29/06 G06F7/00

    摘要: A technique to facilitate decryption processing of information packets transmitted over a communication network after encryption in accordance with a specific network protocol, the details of which may be subject to later change as standards are developed or modified. Programmable registers are used in the decryption process to hold information for identifying an incoming information packet as being subject to the specific protocol and requiring decryption, and identifying a starting location of a data field to be decrypted. Specifically one programmable register contains a first offset locating an identifier field in the packet, in which a cryptographic identifier will be found if the packet is one conforming to the protocol; another programmable register contains a cryptographic identifier value that will be found in the identifier field if decryption is to be performed, and a third programmable register contains a second offset to locate the beginning of a data field to be decrypted.

    摘要翻译: 一种用于根据特定网络协议在加密之后通过通信网络传送的信息分组的解密处理的技术,其细节可能随着标准的开发或修改而随之而变化。 解密过程中使用可编程寄存器来保存用于识别进入信息包的信息为受特定协议的约束,并且需要解密,以及识别要被解密的数据字段的起始位置。 具体地,一个可编程寄存器包含定位分组中的标识符字段的第一偏移,其中如果分组是符合该协议的密钥标识符,将找到密码标识符; 另一个可编程寄存器包含将要在执行解密时在标识符字段中找到的加密标识符值,并且第三可编程寄存器包含第二偏移量以定位待解密的数据字段的开始。

    Hierarchical trusted code for content protection in computers
    7.
    发明授权
    Hierarchical trusted code for content protection in computers 有权
    计算机内容保护的层次可信代码

    公开(公告)号:US07496769B2

    公开(公告)日:2009-02-24

    申请号:US11018065

    申请日:2004-12-20

    IPC分类号: H04L9/00 H04K1/00

    CPC分类号: G06Q10/10 G06F21/57

    摘要: An architecture for protecting premium content in a nonsecure computer environment executes only a small number of code modules in a secure memory. The modules are arranged in a hierarchy of trust, where a module names other modules that it is willing to trust, and those modules in turn name other modules that they are willing to trust. A secure loader loads a security manager that oversees a number of content-providing modules for manipulating the content. A memory manager assigns permissions to various pages of the secure memory. The memory has rings of different security. The security model can be extended to program modules and other devices on the computer's bus, such as DMA controllers and peripherals.

    摘要翻译: 在非安全计算机环境中保护优质内容的架构仅在安全存储器中执行少量代码模块。 这些模块被布置在信任层级中,其中模块命名它愿意信任的其他模块,而这些模块又命名他们愿意信任的其他模块。 安全加载器加载一个安全管理器,该管理器负责监视用于操纵内容的多个内容提供模块。 内存管理员将权限分配给安全内存的各个页面。 内存具有不同安全性的环。 安全模型可以扩展到计算机总线上的程序模块和其他设备,如DMA控制器和外设。

    System and method for accepting disparate types of user input
    8.
    发明授权
    System and method for accepting disparate types of user input 有权
    用于接受不同类型的用户输入的系统和方法

    公开(公告)号:US06788815B2

    公开(公告)日:2004-09-07

    申请号:US09795984

    申请日:2001-02-28

    IPC分类号: G06K900

    摘要: A user interface allows a user to input handwritten, key-press, and spoken text in a seamless, synchronized manner. A text input panel accepts soft keyboard presses and handwritten words, characters, and gestures. A text recognizer/synchronizer integrates textual input from various sources while recognizing and preserving the order in which a user entered text via the soft keyboard, via handwriting, and/or by speaking. Synchronized text may be displayed in a stage area of the text input panel before being passed to an operating system message router and/or an application program. While in handwriting recognition mode, various permutations and combinations of a word recognition area, a character recognition area, and a keybar/keypad may optionally be displayed.

    摘要翻译: 用户界面允许用户以无缝,同步的方式输入手写,按键和口头文本。 文本输入面板接受软键盘按压和手写字,字符和手势。 文本识别器/同步器在识别和保留用户通过软键盘,通过笔迹和/或通过口令输入文本的顺序的同时,集成了来自各种源的文本输入。 同步文本可以在被传递到操作系统消息路由器和/或应用程序之前显示在文本输入面板的阶段区域中。 在手写识别模式中,可以可选地显示字识别区域,字符识别区域和键盘/键盘的各种排列和组合。

    Secure execution of program code
    9.
    发明授权
    Secure execution of program code 有权
    安全执行程序代码

    公开(公告)号:US06651171B1

    公开(公告)日:2003-11-18

    申请号:US09287393

    申请日:1999-04-06

    IPC分类号: G06F1208

    CPC分类号: G06F21/53 G06F12/1491

    摘要: Curtained operation provides trusted execution of code and secrecy of data in a secure memory. Curtained code can only be executed from within certain address ranges of a curtained memory region secure against access by code from without the region. Code entry points are restricted, and atomic execution is assured. The memory is organized into multiple hierarchically curtained rings, and peer subrings are denied access to each other as well as to more secure rings.

    摘要翻译: 窗帘操作提供可信赖的代码执行和安全存储器中数据的保密性。 窗帘代码只能从窗帘内存区域的特定地址范围内执行,以防止无区域的代码访问。 代码入口点受到限制,原子执行得到保证。 存储器被组织成多个分层帘式环,并且对等子被拒绝彼此访问以及更安全的环。