Abstract:
This disclosure provides apparatus, methods and systems for error correction in multi processor systems. Some implementations include a plurality of computing modules, each computing module including a processor. Each processor may include processing state. In some other implementations, each computing module may also include a memory. Upon receiving a signal to perform a partial re-synchronization, a hash of each processor's state data may be performed. In some embodiments, a hash of at least a portion of each computing module's memory data may also be performed. The hashes for each processor are then compared to determine majority hashes and possible minority hashes. Upon identifying a minority hash, the computing module that produced the minority hash may receive new processing state data from one of the computing modules that produced a majority hash.
Abstract:
Embodiments of the present invention are directed to Web-Services- based data backup and data-archiving applications that provide remote data backup and data archiving to private individuals, small businesses, and other organizations that need reliable, secure, geographically remote, and cost-effective data backup, data archiving, and backed-up and archived-data retrieval. In one embodiment of the present invention, a private or small-business client contracts with a service provider for data-backup and data-archiving services. The service provider, in turn, contracts with a remote data-storage facility to provide secure, reliable data backup and data archiving to the personal or small-business client. A client-side application is downloaded to the client computer and configured to allow the client to store locally encrypted data at the remote, data-storage facilities. Neither the service provider nor the data-storage facility can decrypt or otherwise access the information stored by the client. In addition, the encryption key or encryption keys used by the client to encrypt the data for remote storage are securely stored at the remote, data-storage facility for subsequent recovery by the client, should the client suffer damage or loss to a local computer system. However, the client encryption key is stored in a doubly encrypted fashion, preventing access to the client's encryption key by either the service provider or the data-storage facility. Certain embodiments of the present invention also provide local indexing for remotely stored, encrypted data and efficient storage of updates to already remotely stored data.
Abstract:
A system for intelligently managing data in the archival and restoration processes of computer workstations located in a computer network. The system allows quicker, smaller back-ups of the computer network while facilitating the restoration process. The system identifies redundant data found in a pre-determined number of the computer workstations and copies them to a common storage area located on a high-speed storage medium. Placeholders are then placed into the archive file of any workstation that contained the redundant data (518). The sytem also identifies unique data present on the computer workstations and places them in the archive file as is the conventional practice. The system also provides, as part of an Inclusion/Exclusion Engine, intelligent rules for MIS personnel on the server-level to exclude files and directories deemed unique garbage and to include files deemed critical data in the archival process (514). These same rules can be used on the client-level to include or exclude the files and directories that users select. The intelligent inclusion/exclusion rules utilize an inclusion and an exclusion list, which are consulted during the archival process to further reduce the amount of data archived and reduce network resources associated with the archival process.
Abstract:
A data processing system comprising a plurality of computers (2) interconnected through a local network (1), preferably in form of a ring network, said network (1) being connected to a network adaptor (7) which is able to receive all information on the network (7). The network adaptor (7) is connected to a computer (8), which together with the adaptor (7) can perform an assembling and scanning of substantially all files on the network and carry out a recognition of virus signatures, if any. In this manner the individual file packets circulating in the ring network are assembled, said file packets being assembled in a file and scanned for virus signatures, if any. When a virus signature is detected in the file, information is simultaneously provided on the transmitting stations and the receiving stations, whereafter it is possible to transmit the vaccine to the stations in question. The close-down period of the system due to detection of a virus has thereby been reduced to zero.
Abstract:
An integrated circuit includes parity chains which serve as test logic. Each parity chain comprises chains of XOR gates (211, 212, 213 etc.). One input to each XOR gate after the first in a chain is connected to the output of the preceding XOR gate. The remaining inputs are connected to nodes of the main logic, thus defining test points. An error at any one of the test points is indicated in the output of the respective parity chain. The outputs of the parity chains are arranged as parallel inputs to a linear feedback shift register (370) which provides a serial signature which can be analyzed to detect defects in the integrated circuit.
Abstract:
An apparatus and method for identifying faults in a digital logic circuit system (26) combines the output of a feedback signature generator (14) and synchronous transition counter (16) to provide a unique signature which is sensitive both to bit pattern timing and bit pattern sequence. A plurality of output signals via signal lines (32) of the circuit system (26) which are produced in response to a preselected input signal pattern of a test signal generator (24) is processed synchronously under control of a sequence controller (38) through a feedback signature generator (14), such as a serial cyclic redundancy check (CRC) network, and a synchronous bit transition counting network (16). A preselected portion of the output of the bit transition counting network (16) is combined via a signal line (82) with a preselected portion of the bits of the feedback signature generator (14) to obtain a pseudo-random characteristic output bit pattern, or signature, which is unique to the circuit system (26) under test. The fault detecting capability approaches one hundred percent with an embedded indication of the input test pattern duration as verification.
Abstract:
본 발명의 실시 예에 따른 백업 권리 객체의 공통의 백업 포맷은 다음과 같은 특징을 가질 수 있다. ο 권리 객체의 암호화의 보안(cryptographic security)을 위해 결정적이지 않는 라이센스 정보는 제1 데이터 컨테이너(302) 내 잘 정의된 구문과 함께 "기본 텍스트(plain text)"에 보관되고, ο 권리 객체의 암호화의 보안을 위해 결정적인 라이센스 정보는 보호된 폼에 저장된다. 여기서 보호된 폼은 개시 장치를 위해 권리 객체가 제2 데이터 컨테이너(304) 내에 바운드된 것에 대하여 명시된 것이고, 및 ο 권리 객체는 그것이 조작되지 않을 것과 같이 개시 장치에 의해 암호화 적으로 표시된다. 상기 서명은 제3 데이터 컨테이너(306) 내에 저장된다.
Abstract:
네트워크-기반 백업 시스템에서 고도로 효율적인 복구를 위한 시스템 및 방법론이 여기에 제공된다. 설명된 바처럼, 차이-기반 분석(differential-based analysis)이 사용되어 백업 데이터를 검색하기 전에 새로운 완전한 차이가 임의의 복구될 항목과 관련된 특성 및/또는 다른 정보에 기초하여 계산된다. 상기 차이에 기초하여, 상기 항목의 현재 버전과 원버는 버전 사이에 고유하다고 판정된 블록만이 전송되며, 상기 고유하다고 판정된 블록은 상기 항목의 완전한 복구 버전을 획득하기 위해 국부적으로 나타나는 비고유 블록과 병합될 수 있다. 또한, 혼성 구조가 사용되어, 특성 및/또는 데이터가 하나 이상의 로컬 피어 뿐만 아니라 네트워크 내의 글로벌 위치에도 저장될 수 있다. 따라서, 백업 클라이언트는 백업에 필요한 정보를 글로벌 위치 또는 근처의 피어 모두로부터 획득할 수 있고, 지연과 대역폭 소비를 감소할 수 있다.
Abstract:
본 발명은 검사하려는 칩에 하나 이상의 검사 모드를 세팅하고 칩에서 그 검사 모드를 실행하여 칩으로부터 검사 결과를 출력하는 반도체 칩, 특히 반도체 메모리 칩의 검사 방법에 관한 것이다. 본 발명에 따르면, 검사 모드의 세팅 후 그 실행 전에 칩에 세팅된 검사 모드를 규정된 포맷으로 판독하는 점검 모드를 실행한다. 삭제