Method and apparatus for distributing interrupts in a scalable symmetric multiprocessor system without changing the bus width or bus protocol
    1.
    发明公开
    Method and apparatus for distributing interrupts in a scalable symmetric multiprocessor system without changing the bus width or bus protocol 失效
    改变的方法和装置,用于中断在一个可扩展的对称多处理器系统分布,而不总线宽度或总线协议

    公开(公告)号:EP0827085A3

    公开(公告)日:1999-02-03

    申请号:EP97306157.5

    申请日:1997-08-13

    CPC classification number: G06F13/24

    Abstract: A method for supporting multiple distributed interrupt controllers, designated as bus agents, in a symmetric multiprocessing system, includes the steps of assigning a unique identification number to each bus agent, receiving bus requests from the bus agents over four data lines in groups of four, and granting bus ownership to a selected one of the requesting bus agents. Similarly, a computer system that supports multiple distributed interrupt controllers, designated as bus agents, in a symmetric multiprocessing system, includes structure for assigning a unique identification number to each bus agent, four data lines for receiving bus requests from the bus agents in groups of four, and structure for granting bus ownership to a selected one of the requesting bus agents.

    System and method used in a computer system for distributing tasks between multiprocessing I/O subsystems
    2.
    发明公开
    System and method used in a computer system for distributing tasks between multiprocessing I/O subsystems 审中-公开
    在计算机系统中使用的系统和多个处理I / O子系统之间分配任务的方法

    公开(公告)号:EP0969367A3

    公开(公告)日:2001-07-11

    申请号:EP99303930.4

    申请日:1999-05-20

    CPC classification number: G06F9/505

    Abstract: A load balancing system and method for distributing a task between Input/Output subsystems of a computer system. The load balancing system includes a central processing unit for transmitting the task to a central controller. The central controller in response to the transmitted task generates and transmits a request command over a side-band bus to a plurality of peripheral components. Each of the peripheral components that are capable of servicing the request command will transmit a response signal over the side-band bus back to the central controller. Thereafter, the central controller by processing all the response signals dispatches a service command signal to one of the capable peripheral components. The service command signal will direct the one capable peripheral component to service the task.

    Remote security technology
    4.
    发明公开
    Remote security technology 有权
    Ferngesteuerte Sicherheitstechnologie

    公开(公告)号:EP0899647A2

    公开(公告)日:1999-03-03

    申请号:EP98306651.5

    申请日:1998-08-19

    CPC classification number: G08B13/1418 G06F21/31 G06F21/575 G06F2211/1097

    Abstract: A computer (or other complex electronic equipment) security system is proposed whereby access is controlled by remote enablement or disablement of a security feature. The system can be coupled with third-party products to accommodate satellite transmissions for long-distance access control.

    Abstract translation: 提出了一种计算机(或其他复杂电子设备)安全系统,其中通过远程启用或禁用安全特征来控制访问。 该系统可以与第三方产品相结合,以适应卫星传输的远程访问控制。

    Method and apparatus for distributing interrupts in a symmetric multiprocessor system
    5.
    发明公开
    Method and apparatus for distributing interrupts in a symmetric multiprocessor system 失效
    一种用于在对称多处理器系统中断分配的方法和装置

    公开(公告)号:EP0827084A3

    公开(公告)日:1999-02-03

    申请号:EP97306156.7

    申请日:1997-08-13

    CPC classification number: G06F13/24

    Abstract: A distributed interrupt controller system for use in a multiprocessor environment, has at least two local programmable interrupt controllers (LOPICs) coupled to at least one central programmable interrupt controller (COPIC) via a dedicated bus. The COPIC functions as a master arbiter, while the LOPICs, each of which may be integrated with its corresponding processing unit, and any other non-master COPICs are treated as bus agents. Bus grant is achieved by a "round robin" arbitration protocol. For distributed delivery of interrupts, the master arbiter compares a current-task-priority-register value associated with each bus agent to determine the agent that is least busy for delivery of the interrupt thereto.

    Secure two-piece user authentication in a computer network
    6.
    发明公开
    Secure two-piece user authentication in a computer network 失效
    Reesnernetz的eineme zweiteilige Benutzer-Authentifizierung

    公开(公告)号:EP0851335A2

    公开(公告)日:1998-07-01

    申请号:EP97310653.7

    申请日:1997-12-30

    CPC classification number: G06F21/34 G06F2211/005 G06F2211/008

    Abstract: A computer system according to the present invention utilizes a two-piece authentication procedure to securely provide user authentication over a network. In the disclosed embodiment of the invention, a user password is entered during a secure power-up procedure. The user password is encrypted by an external token or smart card that stores an encryption algorithm furnished with an encryption key that is unique or of limited production. A network password is thereby created. The network password is maintained in a secure memory space such as System Management Mode (SMM) memory. When the user desires to access a network resource such as a hard drive in a server, the network password is encrypted and communicated over the network. In the case of a server hard drive, the network password is encrypted using the server s public key (or another key that is known to the server). Optional node identification information is appended to the network password prior to communication over the network. The node identification information can be used for a variety of purposes, including limiting access to certain pieces of data to specified users on specified machines. Once received by the server, the encrypted network password is decrypted using the server s public key. A user verification process is then performed on the network password to determine which, if any, access privileges have been accorded the network user. Numerous other uses for the network password are disclosed, and permit the network resources to be securely compartmentalized with the option to have multiple user levels. The two-piece nature of the authentication process assures that if either the user password or the external token is stolen, it is of little value. Both pieces are required to access protected resources and uniquely identify a user to the network. Further, a network user s identity is maintained when working on different machines.

    Abstract translation: 根据本发明的计算机系统利用两件式认证过程来安全地通过网络提供用户认证。 在所公开的本发明的实施例中,在安全加电过程期间输入用户密码。 用户密码由存储加密算法的外部令牌或智能卡进行加密,该加密算法具有唯一或有限生产的加密密钥。 由此创建网络密码。 网络密码被保存在诸如系统管理模式(SMM)存储器之类的安全存储器空间中。 当用户希望访问诸如服务器中的硬盘的网络资源时,网络密码被加密并通过网络传送。 在服务器硬盘驱动器的情况下,使用服务器的公钥(或服务器已知的另一个密钥)对网络密码进行加密。 在通过网络进行通信之前,将可选节点标识信息附加到网络密码。 节点识别信息可以用于各种目的,包括将特定数据片段的访问限制在指定机器上的指定用户。 一旦被服务器接收到,加密的网络密码将使用server @的公钥解密。 然后对网络密码执行用户验证过程,以确定哪个(如果有的话)已经给予网络用户访问权限。 公开了用于网络密码的许多其他用途,并且允许网络资源被安全地划分为具有多个用户级别的选项。 认证过程的两件性质确保如果用户密码或外部令牌被盗,则其价值不大。 需要这两个部分才能访问受保护的资源,并将网络唯一标识给用户。 此外,在不同的机器上工作时,维护网络用户的身份。

    Disk storage with transparent overflow to network storage
    9.
    发明公开
    Disk storage with transparent overflow to network storage 审中-公开
    Plattenspeicherung mit transparentemÜberlaufzum Netzwerkspeicher

    公开(公告)号:EP1096361A2

    公开(公告)日:2001-05-02

    申请号:EP00620001.8

    申请日:2000-10-03

    CPC classification number: G06F3/0608 G06F3/0631 G06F3/067

    Abstract: A computer system and method of operating a network in which data overflow from workstation or PC hard drives is automatically transferred over to a network server hard drive allowing the workstation user to continue working without interruption. Furthermore, this system minimizes the amount of time a network administrator spends on attending to users who have no remaining hard drive space on their computers.

    Abstract translation: 一种操作网络的计算机系统和方法,其中来自工作站或PC硬盘驱动器的数据溢出被自动转移到网络服务器硬盘驱动器,允许工作站用户继续工作而不间断。 此外,该系统最大限度地减少网络管理员花费在其计算机上没有剩余硬盘空间的用户参与的时间。

Patent Agency Ranking