Hierarchical memory updating system
    1.
    发明授权
    Hierarchical memory updating system 失效
    分层记忆更新系统

    公开(公告)号:US3588839A

    公开(公告)日:1971-06-28

    申请号:US3588839D

    申请日:1969-01-15

    Applicant: IBM

    CPC classification number: G06F12/0804

    Abstract: A COMPUTER MEMORY SYSTEM IN WHICH THE DATA IS TRANSFERRED BETWEEN HIGH-SPEED LOCAL STORAGE AND ONE OR MORE LEVELS OF A LARGER LOW SPEED STORAGE WHEREIN ALTERED DATA IS REWRITTEN IN HIGH-SPEED STORAGE IMMEDIATELY AND IN THE LOWSPEED STORAGE ON A CYCLE STEALING BASIS. CONTROLS ARE PROVIDED SO THAT WHEN A SMALL SEGMENT OF DATA IN A PARTICULAR BLOCK OR PAGE IN HIGH-SPEED STORE IS ALTERED AND INDICATOR IS SET. WHEN MEMORY BUSS TIME IS AVAILABLE TO THE LOW SPEED OR BACKUP STORE THESE INDICATORS WILL BE CHECKED AND WORDS OR LINES REWRITTEN IN SAID BACKUP STORE AS LONG AS A HIGHER PRIORITY JOB IS NOT ENCOUNTERED. WHEN IT IS DESIRED TO REPLACE A COMPLETE PAGE IN HIGH-SPEED STORAGE, INDICATORS FOR THAT PAGE ARE CHECKED AND ALL ALTERED WORDS ARE REWRITTEN IMMEDIATEDLY IN THE BACKUP STORE ON A HIGH PRIORITY BASIS AFTER WHICH THE PAGE IN THE HIGH-SPEED STORE MAY BE OVERWRITTER WITH NEW DATA FROM THE BACKUP STORE.

    Light pen arrangement for providing three degrees of freedom for a light pen in an interactive graphics system
    3.
    发明授权
    Light pen arrangement for providing three degrees of freedom for a light pen in an interactive graphics system 失效
    用于在交互式图形系统中为轻型笔提供三种自由度的轻型笔安排

    公开(公告)号:US3680078A

    公开(公告)日:1972-07-25

    申请号:US3680078D

    申请日:1969-12-23

    Applicant: IBM

    CPC classification number: G06F3/0383

    Abstract: A light pen arrangement is described wherein the light pen has three degrees of freedom, viz. two-dimensional translation in the (X,Y) plane of a cathode ray tube screen and rotation about the projection of its own longitudinal axis to the normal of the screen. To sense the angular position of the light pen, at least two independent light sensitive elements, i.e., fiber optic bundles are required, the latter being suitably provided by dividing the bundle of fiber optics emerging from a single light pen into at least two separate groups and having photosensitive transducer respectively associated with each of the separate groups. When the light pen is placed on the screen and its presence there is sensed, an (X,Y) value pair is stored for the location of each light sensitive area of the light pen, i.e., each of the aforementioned separate fiber optic groups. The storing is accomplished by having an electron beam draw lines or points in each light sensitive area and, receiving in response thereto, interrupts for points or lines in the field of view of each fiber optic group, the (X,Y) coordinate of each point or line causing an interrupt and the fiber optic group that picked up the interrupt is now known to the computer or other control arrangement controlling the cathode ray tube. The computer or control arrangement can then compute the (X,Y) location of the light pen as the centroid of the individual areas and the angular position of the pen.

    Abstract translation: 描述了一种光笔布置,其中光笔具有三个自由度,即, 在阴极射线管屏幕的(X,Y)平面上进行二维平移,并且围绕其自身纵轴的投影相对于屏幕的法线旋转。 为了感测光笔的角度位置,需要至少两个独立的光敏元件,即光纤束,后者通过将从单个光笔出射的光纤束分成至少两个分开的组来适当地提供 并具有分别与每个单独组相关联的光敏传感器。 当光笔被放置在屏幕上并且其中存在时,存储用于光笔的每个光敏区域(即上述各个光纤组)的位置的(X,Y)值对。 存储是通过在每个光敏区域中具有电子束绘制线或点来实现的,并且响应于此而接收每个光纤组的视场中的点或线的中断,每个光纤组的(X,Y)坐标 导致中断的点或线,拾取中断的光纤组现在已知到控制阴极射线管的计算机或其他控制装置。 计算机或控制装置然后可以计算光笔的(X,Y)位置作为各个区域的重心和笔的角位置。

    5.
    发明专利
    未知

    公开(公告)号:FR2322406A1

    公开(公告)日:1977-03-25

    申请号:FR7620693

    申请日:1976-07-01

    Applicant: IBM

    Abstract: An operating system authenticator for determining if an operating system being loaded in a computer is valid. A user's identification code or secret key which is unique to the operating system, and a verifier value which is a predetermined function of a valid operating system and the identification code are respectively stored. A hash function, which is a function of the operating system being loaded and the identification code, is generated by the authenticator. After the operating system is loaded, the hash function is used as an authenticating value and compared with the verifier value for determining the authenticity of the loaded operating system.

    OPERATING SYSTEM AUTHENTICATOR
    6.
    发明专利

    公开(公告)号:CA1071771A

    公开(公告)日:1980-02-12

    申请号:CA258910

    申请日:1976-08-11

    Applicant: IBM

    Abstract: OPERATING SYSTEM AUTHENTICATOR of The Disclosure An operating system authenticator for determining if an operating system being loaded in a computer is valid. A user's identification code or secret key which is unique to the operating system, and a verifier value which is a predetermined function of a valid operating system and the identification code are respectively stored. A hash function, which is a function of the operating system being loaded and the identification code, is generated by the authenticator. After the operating system is loaded, the hash function is used as an authenticating value and compared with the verifier value for determining the authenticity of the loaded operating system.

    7.
    发明专利
    未知

    公开(公告)号:FR2334149A1

    公开(公告)日:1977-07-01

    申请号:FR7632296

    申请日:1976-10-21

    Applicant: IBM

    Abstract: 1534189 Monitoring storage accesses INTERNATIONAL BUSINESS MACHINES CORP 16 Nov 1976 [4 Dec 1975] 47656/76 Heading G4A A memory 12 or 32 is divided into envelopes 12a-12f or 34 each of which has an associated storage element 18 or 30 in which a time stamp from a clock 20 is recorded each time that envelope is accessed. Time stamp recording is automatic so that by reading the time stamps for particular memory elements a user can determine if any unauthorized access has been made since the last authorized access. Memory 12 may be a random access memory of which time stamp registers 18 form a part. Memory 32 may be a magnetic disc unit having two envelopes 34 and associated time stamp words 30 per track. The arrangement is described in detail in the context of a virtual memory system in which the time stamp registers 18 form an associative memory which is searched by block registers and stores time stamps together with indications as to whether the relevant accesses were for read or write. Any time stamp register 18 can be read by a special instruction FSM which loads the contents of the required register 18 into a specified register in the CPU 10. Each data channel 38 has a corresponding time stamp register 36 which is loaded with a time stamp word 30 whenever a disc envelope is moved via the channel to a memory 12 envelope (the appropriate register 18 and word 30 also time stamped from clock 20). The register 36 contents can be loaded into a specified CPU register by a special instruction FSC. Data envelope transfer between disc 32 and memory 12 takes place serially by word via a shift register buffer.

    DATA SECURITY SYSTEM EMPLOYING AUTOMATIC TIME STAMPING MECHANISM

    公开(公告)号:CA1080365A

    公开(公告)日:1980-06-24

    申请号:CA266860

    申请日:1976-11-30

    Applicant: IBM

    Abstract: A data security system employing an automatic time-stamping mechanism for stamping a time accrued in a data storage area or register associated with each envelope or block of a memory or for each data channel of an auxiliary storage device, such that each access or data updates the appropriate time stamp in the memory of storage device. A first instruction provides the fetch of the time stamp with regard to the main memory, and a second instruction provides the fetch with regard to information contained in the data channel corresponding to the auxiliary storage device. For every envelope of a memory, there is a time stamp tag register associated with it. Similarly, there is a time stamp register associated with every data channel. Whenever an envelope of memory is accessed, the time stamp in the form of a unique binary number from a clock, indicating the time of day, is inserted into the tag register associated with that envelope. Examination of the contents of each tag register enables determination of whether there has been access to an envelope up to the present time. A full memory address register is used to access data in the memory while only special high order bits of the memory address register are used to access the time stamp associated with the envelope. The system provides a mechanism which automatically marks blocks of data as they are accessed and cannot be bypassed by altering the program.

Patent Agency Ranking