-
公开(公告)号:JPH10254786A
公开(公告)日:1998-09-25
申请号:JP31352797
申请日:1997-11-14
Applicant: IBM
Inventor: ESKESEN FRANK NORMAN , HACK MICHEL HENRI THEODORE , HALIM NAGUI , KING RICHARD PERVIN
Abstract: PROBLEM TO BE SOLVED: To prevent data saved in a memory from being destroyed owing to an error of an application program by providing a visible part and a hidden part for a memory in a computer system and using the hidden part to save data to be transmitted. SOLUTION: An operating system(OS) 4 can be addressed to the visual part 30 of the memory. The addressing possibility of the process or OS 4 is excluded from the hidden part 60 of the memory. The hidden part 60 is used to save data to be transmitted by the processor or OS 4. A communication area arranged at the visible part 30 receives a data access request from the processor or OS 4. A hide server 70 which addresses both the visible part 30 and hidden part 60 receives the data access request from the communication area and starts data access to the hidden part 60.
-
公开(公告)号:DE69710034T2
公开(公告)日:2002-09-26
申请号:DE69710034
申请日:1997-11-06
Applicant: IBM
Inventor: ESKESEN FRANK NORMAN , HACK MICHEL HENRI THEODORE , HALIM NAGUI , KING RICHARD PERVIN
Abstract: A memory (20) in a computer system includes a visible portion (30) and a hidden portion (60). The visible portion (30) of the memory (20) is addressable by a processor (15a-15n) and the operating system (40) operating within the computer system. Addressability by either the processor or the operating system is excluded to the hidden portion of the memory. The hidden portion of the memory is used for storing data transmitted by either the processor or the operating system. A communications area (80), located in the visible portion of memory receives requests for data access from either the processor or the operating system. A hidden server (70) which addresses both the visible portion of memory and the hidden portion of memory receives requests for data access from the communications area and initiates data access from the hidden memory.
-
公开(公告)号:DE69710034D1
公开(公告)日:2002-03-14
申请号:DE69710034
申请日:1997-11-06
Applicant: IBM
Inventor: ESKESEN FRANK NORMAN , HACK MICHEL HENRI THEODORE , HALIM NAGUI , KING RICHARD PERVIN
Abstract: A memory (20) in a computer system includes a visible portion (30) and a hidden portion (60). The visible portion (30) of the memory (20) is addressable by a processor (15a-15n) and the operating system (40) operating within the computer system. Addressability by either the processor or the operating system is excluded to the hidden portion of the memory. The hidden portion of the memory is used for storing data transmitted by either the processor or the operating system. A communications area (80), located in the visible portion of memory receives requests for data access from either the processor or the operating system. A hidden server (70) which addresses both the visible portion of memory and the hidden portion of memory receives requests for data access from the communications area and initiates data access from the hidden memory.
-
公开(公告)号:SG73478A1
公开(公告)日:2000-06-20
申请号:SG1997003909
申请日:1997-10-29
Applicant: IBM
Inventor: ESKESEN FRANK NORMAN , HACK MICHEL HENRI THEODORE , HALIM NAGUI , KING RICHARD PERVIN
Abstract: A memory (20) in a computer system includes a visible portion (30) and a hidden portion (60). The visible portion (30) of the memory (20) is addressable by a processor (15a-15n) and the operating system (40) operating within the computer system. Addressability by either the processor or the operating system is excluded to the hidden portion of the memory. The hidden portion of the memory is used for storing data transmitted by either the processor or the operating system. A communications area (80), located in the visible portion of memory receives requests for data access from either the processor or the operating system. A hidden server (70) which addresses both the visible portion of memory and the hidden portion of memory receives requests for data access from the communications area and initiates data access from the hidden memory.
-
-
-