41.
    发明专利
    未知

    公开(公告)号:DE69624191T2

    公开(公告)日:2003-06-12

    申请号:DE69624191

    申请日:1996-07-25

    Abstract: A method for atomically updating Error Detection Code (EDC) protected data in memory such that the EDC protection is maintained to the granularity of a single microprocessor machine instruction. The method is employed in a memory system having a volatile storage area and at least one nonvolatile storage area, each of the storage areas storing a copy of the protected data and two copies of its associated error detection code. The volatile and nonvolatile storage areas each have a first storage location for storing one of the copies of the associated error code and a second storage location for storing the other of the copies of the associated error code. In such a system, a chosen field with the data structure in the volatile copy is updated. Once the volatile copy is updated, a new error detection code is computed with the data in the volatile copy. The new error detection code is then written to the first storage location in each of the storage areas, volatile and nonvolatile, one at a time. Once the copies have been written with the new EDC, the chosen field of the data structure within the nonvolatile copy is updated. Lastly, the new error code is written to the second storage location in each of the updated storage areas.

    43.
    发明专利
    未知

    公开(公告)号:DE69529129T2

    公开(公告)日:2003-04-24

    申请号:DE69529129

    申请日:1995-09-07

    Abstract: Power usage in a personal computer is reduced by repetitively performing the following sequence of steps: a. generate a wake-up signal in connection with a user beginning to interact with the computer; b. in response to the wake-up signal, switch at least a portion of the computer into a more fully powered mode; and c. keep the portion of the computer in the more fully powered mode only as long as the user is delivering input to the computer, and thereafter immediately switch the portion of the computer into a less fully powered mode. A detector issues a wake-up signal when a user begins to interact with the computer; and control circuitry connected to the sensor switches between the more fully powered mode and the less fully powered mode. The sensor may be mounted in a keyboard that includes an array of keys, and a sensor mounted in a position to detect use of the keyboard even when the keyboard is in an unpowered state.

    46.
    发明专利
    未知

    公开(公告)号:DE69332396D1

    公开(公告)日:2002-11-21

    申请号:DE69332396

    申请日:1993-07-14

    Abstract: In a computer network, each pair of host computers that need to exchange data packets establish a single host-to-host encryption/decryption key. Then, whenever one host computer sends a data packet to the other host computer, it first forms a predefined logical combination of the established host-to-host key and the destination buffer index to which the data packet is being sent, and then uses the resulting value to encrypt the secure portions of the data packet. The destination buffer index is included in the data packet's header, which is not encrypted. When the receiving host computer receives the encrypted data packet, it reads the destination buffer index from the packet header, forms the same predefined logical combination of the established host-to-host key and the destination buffer index to generate a decryption key, and uses the computed decryption key to decrypt the secure portions of the received data packet. If the destination buffer index in the received data packet has been modified either by noise or by an interloper, the decryption key computed by the receiving host computer will be different from the encryption key used by the sending host computer, and therefore the portions of the received data packet decrypted using the computed decryption key will be unintelligible. Thus, interlopers are prevented from breaching the confidentiality of encrypted data.

    49.
    发明专利
    未知

    公开(公告)号:DE69624191D1

    公开(公告)日:2002-11-14

    申请号:DE69624191

    申请日:1996-07-25

    Abstract: A method for atomically updating Error Detection Code (EDC) protected data in memory such that the EDC protection is maintained to the granularity of a single microprocessor machine instruction. The method is employed in a memory system having a volatile storage area and at least one nonvolatile storage area, each of the storage areas storing a copy of the protected data and two copies of its associated error detection code. The volatile and nonvolatile storage areas each have a first storage location for storing one of the copies of the associated error code and a second storage location for storing the other of the copies of the associated error code. In such a system, a chosen field with the data structure in the volatile copy is updated. Once the volatile copy is updated, a new error detection code is computed with the data in the volatile copy. The new error detection code is then written to the first storage location in each of the storage areas, volatile and nonvolatile, one at a time. Once the copies have been written with the new EDC, the chosen field of the data structure within the nonvolatile copy is updated. Lastly, the new error code is written to the second storage location in each of the updated storage areas.

    50.
    发明专利
    未知

    公开(公告)号:DE69620994T2

    公开(公告)日:2002-10-31

    申请号:DE69620994

    申请日:1996-02-12

    Inventor: MANASSE S

    Abstract: A method of conducting computerized commerce on a number of computer systems connected by a computer network including providing a broker computer system, the broker system having a database of broker scrips, each of the broker scrips representing a form of electronic currency, providing a vendor computer system, the vendor computer system having a database containing products which may be exchanged for the broker scrips, the vendor computer system capable of providing vendor scrips, providing a consumer computer system, the consumer computer system having a user interface wherein a user may initiate transactions in the consumer computer system to obtain one or more of the products contained in the database of the vendor computer system, sending a first request from the user on the consumer computer system to obtain a first broker scrip from the broker computer system, processing the first request in the broker computer system, sending the first broker scrip to the consumer computer system in response to the step of processing, sending a second request from the broker computer system to obtain a first vendor scrip from the vendor broker computer system, processing the second request in the vendor computer system, sending the first vendor scrip to the broker computer system in response to the step of processing the second request, sending a third request from the consumer computer system to the broker computer system for a first product, exchanging the first broker scrip for the first vendor scrip, and delivering the product to the consumer computer system in response to the step of exchanging.

Patent Agency Ranking