System and method for arbitrating access to a memory

    公开(公告)号:US06671784B2

    公开(公告)日:2003-12-30

    申请号:US09996934

    申请日:2001-11-30

    Applicant: Jin Hyuk Lee

    Inventor: Jin Hyuk Lee

    CPC classification number: G06F13/1605

    Abstract: A method and a system for arbitrating accesses to a memory in a data processing system having many memory access units (MAU) and an arbiter are disclosed. The arbiter initially sends a permission signal to each MAU to give each MAU a chance to reset its priority level if necessary. Then each of a first set of top priority MAUs that was not able to access to the memory for a predetermined period of time resets its priority level to a top priority value and sends a second priority value to the arbiter. Thereafter the arbiter selects a MAU among the first set of top priority MAUs and sends an acknowledgement signal to the selected MAU. If none of the first set of top priority MAUs exist, the arbiter identifies a second set of top priority MAUs by checking the predetermined starvation period of each MAU and sends an acknowledgement signal to one of the second set of top priority MAUs.

    VARIABLE BIOMETRIC INFORMATION-BASED AUTHENTICATION SYSTEM AND AUTHENTICATION METHOD USING THE SAME

    公开(公告)号:US20190392125A1

    公开(公告)日:2019-12-26

    申请号:US15763721

    申请日:2017-10-30

    Abstract: An authentication system that uses personal variable biometric information which changes according to times and environments, and an authentication method using the same are disclosed. The variable biometric information-based authentication system includes: a mobile terminal configured to generate information regarding an ID that intends to access a facility or information requiring an access authority, and to collect variable biometric information, such that information regarding the ID and the variable biometric information are stored all together; and a variable biometric information management server configured to, when the mobile terminal requests a login command regarding the ID, verify validity of the login command regarding the ID based on the variable biometric information. Accordingly, a real data value of collected biometric information is not used in the authentication procedure, and the authentication procedure is performed only by using a figure or a form of a graph indicating a variation in a specific section or a data arithmetic value obtained by performing a predetermined arithmetic operation with respect to the real data value. Therefore, even if the biometric information used in the authentication procedure is leaked, a damage resulting therefrom can be inhibited. In addition, since a security level of the authentication procedure can be selectively determined, the security of the authentication procedure can be enhanced by combining different types of variable biometric information or by combining variable biometric information of a plurality of users. In addition, as the security level of the authentication procedure is selectively determined, the authentication procedure can be diversely utilized in an entering authentication to a facility such as an office or school or secure authentication in financial services such as account transfer, payment, etc.

    METHOD FOR DONATING CONTENT AND PURCHASING DONATED CONTENT USING SOCIAL NETWORK SERVICE

    公开(公告)号:US20190333117A1

    公开(公告)日:2019-10-31

    申请号:US15763720

    申请日:2017-10-30

    Abstract: A method for donating a content and purchasing a donated content using a social network service is provided. The donation and purchasing method includes the steps of: receiving, by a server, content information from a first user terminal; verifying, by the server, validity of the received content information; and, when the validity of the content information is verified, storing, by the server, the content information. According to the content donation and donated content purchasing method using the social network service, normally produced contents are potentially and continuously donated, and a donor expands donees by directly selecting or discovering donees. In addition, a shared existing content is easily donated through a simple change process of making it easy to donate, and a purchaser becomes a donor by selecting a purchase amount of money and purchasing content information.

    Variable biometric information-based authentication system and authentication method using the same

    公开(公告)号:US10803158B2

    公开(公告)日:2020-10-13

    申请号:US15763721

    申请日:2017-10-30

    Abstract: An authentication system that uses personal variable biometric information which changes according to times and environments, and an authentication method using the same are disclosed. The variable biometric information-based authentication system includes: a mobile terminal configured to generate information regarding an ID that intends to access a facility or information requiring an access authority, and to collect variable biometric information, such that information regarding the ID and the variable biometric information are stored all together; and a variable biometric information management server configured to, when the mobile terminal requests a login command regarding the ID, verify validity of the login command regarding the ID based on the variable biometric information. Accordingly, a real data value of collected biometric information is not used in the authentication procedure, and the authentication procedure is performed only by using a figure or a form of a graph indicating a variation in a specific section or a data arithmetic value obtained by performing a predetermined arithmetic operation with respect to the real data value. Therefore, even if the biometric information used in the authentication procedure is leaked, a damage resulting therefrom can be inhibited. In addition, since a security level of the authentication procedure can be selectively determined, the security of the authentication procedure can be enhanced by combining different types of variable biometric information or by combining variable biometric information of a plurality of users. In addition, as the security level of the authentication procedure is selectively determined, the authentication procedure can be diversely utilized in an entering authentication to a facility such as an office or school or secure authentication in financial services such as account transfer, payment, etc.

    Method and Apparatus for Variable Social Network Service

    公开(公告)号:US20170351766A1

    公开(公告)日:2017-12-07

    申请号:US15510939

    申请日:2015-12-18

    CPC classification number: G06F16/9535 G06Q50/01

    Abstract: Provided herein is a variable social network service method and apparatus. The variable social network service method includes receiving, by a variable social network service apparatus, information on whether or not a user serves as a bridge from a user apparatus of the user, and determining, by the variable social network service apparatus, whether or not to expand a social network based on the user based on the information on whether or not the user serves as the bridge, wherein the variable social network service apparatus determines whether or not social networking is possible between a first network subject of the user and a second network subject of the user depending on whether or not the user serves as the bridge.

    NON-VOLATILE MEMORY DEVICE AND OPERATION METHOD USING THE SAME
    20.
    发明申请
    NON-VOLATILE MEMORY DEVICE AND OPERATION METHOD USING THE SAME 有权
    非挥发性存储器件及其操作方法

    公开(公告)号:US20110202818A1

    公开(公告)日:2011-08-18

    申请号:US13025463

    申请日:2011-02-11

    Abstract: The non-volatile memory system includes a non-volatile memory and a controller. The non-volatile memory includes a data region including a sector region for storing sector data, and an uncorrectable information region for storing uncorrectable sector information on the sector region. The controller includes an information generation unit for generating the uncorrectable sector information that indicates whether the sector region is assigned to an uncorrectable sector region, according to a command output from a host.

    Abstract translation: 非易失性存储器系统包括非易失性存储器和控制器。 非易失性存储器包括包括用于存储扇区数据的扇区区域的数据区域和用于在扇区区域上存储不可校正扇区信息的不可校正信息区域。 控制器包括信息生成单元,用于根据从主机输出的命令,生成指示扇区是否分配给不可校正扇区的不可校正扇区信息。

Patent Agency Ranking