Abstract:
PROBLEM TO BE SOLVED: To provide authentication of either code or data or both, and protected execution environments. SOLUTION: For authentication of code or data, a local storage is dynamically divided and division cancelled. The local storage is divided into an isolated section and a non-isolated section. The code or the data are loaded in the isolated section. Either the code or the data are authenticated in the isolated section of the local storage. After the authentication, the code is executed. After the execution, a memory within the isolated section of an attached processor unit, and the attached processor unit performs division cancellation with the isolated section within the local storage. COPYRIGHT: (C)2005,JPO&NCIPI
Abstract:
PROBLEM TO BE SOLVED: To provide a management system and a method for streaming data in a cache. SOLUTION: A computer system 100 comprises: a processor 102; the cache 104; and a system memory 110. The processor 102 issues a data request for the streaming data. The streaming data has one or more small data portions. The system memory 110 has a specific area for storing the streaming data. The cache has a predefined area locked for the streaming data and is connected to a cache controller which is in communication with a processor 106 and the system memory 110. When at least one small data portion for the streaming data is not found in the predefined area of the cache, the small data portion is transferred to the predefined area of the cache 104 from the specific area of the system memory 110. COPYRIGHT: (C)2004,JPO&NCIPI
Abstract:
The present invention is a method for integrating multiple object codes from heterogeneous architectures. For a program on a first processor to reference a program from the name space of a second processor, the object code for the second-processor program is enclosed in a wrapper to create object code in the first-processor name space. The header of the wrapped object code defines a new symbol in the name space of the first processor, and the symbol points to the second-processor object code contained in the wrapped object code. Instead of directly referencing the second-processor object code, the referencing program on the first processor references the wrapped object code. A system tool can be used to wrap the object code which runs on the second processor.
Abstract:
A method, an apparatus, and a computer program are provided for controlling memory access. Direct Memory Access (DMA) units have become commonplace in a number of bus architectures. However, managing limited system resources has become a challenge with multiple DMA units. In order to mange the multitude of commands generated and preserve dependencies, embedded flags in commands or a barrier command are used. These operations then can control the order in which commands are executed so as to preserve dependencies.
Abstract:
A system and method for virtualization of processor resources is presented. A thread is created on a processor and the processor's local memory is mapped into an effective address space. In doing so, the processor's local memory is accessible by other processors, regardless of whether the processor is running. Additional threads create additional local memory mappings into the effective address space. The effective address space corresponds to either a physical local memory or a "soft" copy area. When the processor is running, a different processor may access data that is located in the first processor's local memory from the processor's local storage area. When the processor is not running, a softcopy of the processor's local memory is stored in a memory location (i.e. locked cache memory, pinned system memory, virtual memory, etc.) for other processors to continue accessing.
Abstract:
CON EL FIN DE INCREMENTAR EL NUMERO DE FLUJOS CONTINUOS DE DATOS SUMINISTRADOS POR UN SISTEMA MULTIMEDIA, SE PRESENTA UN GRUPO DE GRUPOS DE SUBSISTEMAS SERVIDORES MULTIMEDIA DE A/V. CADA GRUPO, A SU VEZ, CONSTA DE UN CONJUNTO DE SERVIDORES DE A/V, UN CONJUNTO DE DISPOSITIVOS DE ALMACENAMIENTO DE DATOS CON ARQUITECTURAS DE BUCLE COMPARTIDO INTERCONECTADOS A LOS SERVIDORES DE A/V, DONDE CUALQUIERA DE LOS SERVIDORES DEL GRUPO PUEDE ACCEDER SUSTANCIALMENTE DE FORMA EQUIVALENTE A CUALQUIER DISPOSITIVO DE ALMACENAMIENTO, Y UN SUBSISTEMA SERVIDOR DE CONTROL DE ELEVADA DISPONIBILIDAD INTERCONECTADO CON LOS SERVIDORES DE A/V Y LOS DISPOSITIVOS DE ALMACENAMIENTO DE DATOS, PARA CONTROLAR TANTO A ESTOS COMO A AQUELLOS. CADA UNO DE LOS GRUPOS SE ENCUENTRA INTERCONECTADO CON UN CONMUTADOR DE ALTA VELOCIDAD PARA EL SUMINISTRO DE LOS FLUJOS CONTINUOS DE DATOS DESDE EL GRUPO AL USUARIO FINAL. UNO DE LOS SUBSISTEMAS SERVIDORES DE CONTROL ACTUA TAMBIEN COMO SERVIDOR DE CONTROL MAESTRO QUE ASIGNA SOLICITUDES DE FLUJOS CONTINUOS DE DATOS A UNO DE LOS GRUPOS.
Abstract:
A manufacturing compact disk is provided which stores the complete range of software which may be stored on the computer system. Associated with the computer system is a manufacturing diskette which includes installation files which define which software on the CD is to be transferred to the system. This manufacturing diskette also includes diagnostic and/or other code which is employed at other stages of the system assembly process.
Abstract:
An apparatus and method are provided for disabling the clocking of a processor in a battery operated computer during non-processing times. The clocking is disabled at the conclusion of a processing operation. The clocking can then be re-enabled using interrupts from any one of a plurality of sources, such as an I/O device or a direct memory access. Application programs and operating system programs running on the system can specify the stopping of the system clock and the central processor until a specified event which had been requested occurs, or until an optional time-out period has expired. In this situation, the event is defined as one that results in either a system interrupt from an I/O device or from a direct memory access operation. The stopping of the system clock is a two part operation wherein in the first part the stopping mechanism is first armed. If an interrupt is received subsequent to arming, then it will be processed and the arming mechanism will be reset. However, if an interrupt does not occur after arming within a specified time period, then the system clock will be stopped.