Mapping an N-bit application ported from an M-bit application to an N-bit architecture
    11.
    发明授权
    Mapping an N-bit application ported from an M-bit application to an N-bit architecture 有权
    映射从M位应用程序移植到N位架构的N位应用程序

    公开(公告)号:US08001359B2

    公开(公告)日:2011-08-16

    申请号:US12241039

    申请日:2008-09-30

    Abstract: Embodiments of the present invention provide a system that maps an N-bit application to virtual memory. The N-bit application may be obtained by porting an M-bit application to an N-bit architecture where N is greater than M. During operation, the system receives a request to map an N-bit application to a computer's virtual memory. The system then maps the N-bit application to a section of virtual memory which begins at a memory address that is greater than or equal to 2M. If the N-bit application accesses a memory address which is less than 2M, the system can generate a trap, thereby facilitating the discovery of M-bit memory references in the N-bit application.

    Abstract translation: 本发明的实施例提供将N位应用映射到虚拟存储器的系统。 可以通过将M位应用移植到N大于M的N位架构来获得N位应用。在操作期间,系统接收将N位应用映射到计算机的虚拟存储器的请求。 然后,系统将N位应用程序映射到从大于或等于2M的存储器地址开始的虚拟存储器的一部分。 如果N位应用访问小于2M的存储器地址,则系统可以生成陷阱,从而有助于在N位应用中发现M位存储器引用。

    Opportunistic multitasking
    12.
    发明授权
    Opportunistic multitasking 有权
    机会多任务

    公开(公告)号:US09135059B2

    公开(公告)日:2015-09-15

    申请号:US12959284

    申请日:2010-12-02

    CPC classification number: G06F9/485 G06F9/5011 G06F9/542

    Abstract: Services for a personal electronic device are provided through which a form of background processing or multitasking is supported. The disclosed services permit user applications to take advantage of background processing without significant negative consequences to a user's experience of the foreground process or the personal electronic device's power resources. To effect the disclosed multitasking, one or more of a number of operational restrictions may be enforced. By way of example, thread priority levels may be overlapped between the foreground and background states. In addition, system resource availability may be restricted based on whether a process is receiving user input. In some instances, an application may be suspended rather than being placed into the background state. Implementation of the disclosed services may be substantially transparent to the executing user applications and, in some cases, may be performed without the user application's explicit cooperation.

    Abstract translation: 提供个人电子设备的服务,支持后台处理或多任务的形式。 所公开的服务允许用户应用程序利用后台处理,而不会对用户对前台进程或个人电子设备的电源资源的体验产生显着的负面影响。 为了实现所公开的多任务,可以执行一些或多个操作限制。 作为示例,线程优先级可以在前台和后台状态之间重叠。 另外,可以基于进程是否正在接收用户输入来限制系统资源的可用性。 在某些情况下,应用程序可能被暂停,而不是被置于背景状态。 所公开的服务的实现可以对于执行的用户应用程序是基本透明的,并且在一些情况下可以在没有用户应用程序的明确协作的情况下执行。

    System and method for in-place encryption
    13.
    发明授权
    System and method for in-place encryption 有权
    用于就地加密的系统和方法

    公开(公告)号:US08924739B2

    公开(公告)日:2014-12-30

    申请号:US12985190

    申请日:2011-01-05

    CPC classification number: G06F21/78

    Abstract: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for performing in-place encryption. A system configured to practice the method receives a request from a user to encrypt an unencrypted volume of a computing device and identifies, generates, and/or randomly selects a volume key. Then the system converts the unencrypted volume to an encryptable format divided into portions. The system then encrypts, based on the volume key, the encryptable volume, portion by portion, to enable the user to use the computing device while encrypting. The system can maintain an encryption progress status and display the encryption progress status. The system can monitor disk accesses to the encryptable volume, and, when the disk accesses exceed a first threshold, apply a back-off algorithm to stop encrypting until the disk accesses fall below a second threshold. Thus, the computing device can be used while the encryption occurs in the background.

    Abstract translation: 这里公开了用于执行就地加密的系统,方法和非暂时的计算机可读存储介质。 被配置为实施该方法的系统接收来自用户的加密计算设备的未加密卷的请求,并且识别,生成和/或随机选择卷密钥。 然后,系统将未加密的卷转换成可分割的部分的可加密格式。 然后,该系统基于音量密钥逐个地加密可加密卷,以使得用户能够在加密时使用计算设备。 系统可以保持加密进度状态并显示加密进度状态。 系统可以监视对可加密卷的磁盘访问,并且当磁盘访问超过第一阈值时,应用退避算法来停止加密,直到磁盘访问低于第二阈值。 因此,可以在后台进行加密时使用计算装置。

    Providing a reliable operating system for clients of a net-booted environment
    15.
    发明授权
    Providing a reliable operating system for clients of a net-booted environment 有权
    为网络引导环境的客户提供可靠的操作系统

    公开(公告)号:US06751658B1

    公开(公告)日:2004-06-15

    申请号:US09420614

    申请日:1999-10-18

    Abstract: A method and apparatus are provided for supplying a reliable and maintainable operating system in a net-booted environment. According to one embodiment, a network computer (NC) client boots from a boot image provided by an NC server. The boot image includes information identifying the location of one or more system volumes on the NC server that contain operating system software. In response to an attempt to modify the contents of the one or more system volumes, the NC client causes information identifying the modification to be recorded on the NC server separate from the one or more system volumes in a storage area associated with the NC client.

    Abstract translation: 提供了一种用于在网络引导的环境中提供可靠和可维护的操作系统的方法和装置。 根据一个实施例,网络计算机(NC)客户机从NC服务器提供的引导映像启动。 引导映像包括标识NC服务器上包含操作系统软件的一个或多个系统卷的位置的信息。 响应于尝试修改一个或多个系统卷的内容,NC客户端将识别要在NC服务器上记录的修改的信息与与NC客户端相关联的存储区域中的一个或多个系统卷分开。

Patent Agency Ranking