METHOD AND SYSTEM FOR FILE STORAGE AND ACCESS

    公开(公告)号:US20170132240A1

    公开(公告)日:2017-05-11

    申请号:US15413048

    申请日:2017-01-23

    Abstract: Disclosed embodiments relate to storing and accessing files. In an embodiment, a method includes writing a file to a writing a file to a storage device having a file system having a file allocation table (FAT). Writing the file includes allocating a plurality of clusters of the file system to the file, wherein at least a portion of the allocated clusters is contiguous. The FAT includes a plurality of cluster addresses corresponding to the allocated clusters. A signature value is stored in a cluster address corresponding to a first cluster of the contiguous clusters to indicate the presence of the contiguous clusters. In each of a set of consecutive cluster addresses succeeding the cluster address corresponding to the first cluster, a value that partially represents the number of the contiguous clusters is stored. The number of contiguous clusters is determinable by combining the values stored in the consecutive cluster addresses.

    LOOK-AHEAD CONVERGENCE FOR OPTIMIZING DISPLAY RENDERING OF STEREOSCOPIC VIDEOS AND IMAGES
    43.
    发明申请
    LOOK-AHEAD CONVERGENCE FOR OPTIMIZING DISPLAY RENDERING OF STEREOSCOPIC VIDEOS AND IMAGES 审中-公开
    用于优化立体视像和图像显示渲染的前瞻性综合

    公开(公告)号:US20160344997A1

    公开(公告)日:2016-11-24

    申请号:US15226430

    申请日:2016-08-02

    CPC classification number: H04N13/133 H04N13/128 H04N13/144

    Abstract: The present invention is drawn to a device for use with first stereoscopic data, second stereoscopic data and a display device. The device includes an input portion, a convergence data detecting portion, a convergence plane portion, a comparing portion and a modification portion. The input portion can receive the first stereoscopic data and the second stereoscopic data. The convergence data detecting portion can detect first convergence data within the first stereoscopic data and can detect second convergence data within the second stereoscopic data. The convergence plane portion can determine a first convergence plane based on the first convergence data and can determine a second convergence plane based on the second convergence data. The comparing portion can compare the first convergence plane and the second convergence plane and can generate a convergence plane comparison. The modification portion can modify the first convergence data based on the convergence plane comparison.

    Abstract translation: 本发明涉及一种用于第一立体数据,第二立体数据和显示装置的装置。 该装置包括输入部分,会聚数据检测部分,会聚平面部分,比较部分和修改部分。 输入部分可以接收第一立体数据和第二立体数据。 会聚数据检测部分可以检测第一立体数据内的第一会聚数据,并且可以检测第二立体数据内的第二会聚数据。 会聚平面部分可以基于第一会聚数据确定第一会聚平面,并且可以基于第二会聚数据确定第二会聚平面。 比较部分可以比较第一会聚平面和第二会聚平面,并可以生成会聚平面比较。 修改部分可以基于会聚平面比较来修改第一收敛数据。

    FILE ACCESS METHOD AND SYSTEM THEREOF
    44.
    发明申请
    FILE ACCESS METHOD AND SYSTEM THEREOF 有权
    文件访问方法及其系统

    公开(公告)号:US20150134711A1

    公开(公告)日:2015-05-14

    申请号:US14075757

    申请日:2013-11-08

    Abstract: Several systems and methods for accessing files stored in a storage device are disclosed. In an embodiment, the method includes accessing a file allocation table (FAT) in a computer file system associated with the storage device. The FAT includes a plurality of cluster addresses corresponding to a plurality of clusters allocated to a file stored in the storage device. A cluster address is read to identify a location of a next cluster. One or more bits in the cluster address are read to determine a presence of a signature value indicating allocation of a set of contiguous clusters from among the plurality of clusters. A number of contiguous clusters is computed based on a pre-determined number of consecutive cluster addresses succeeding the cluster address if the signature value is present. The set of contiguous clusters are read from the storage device based on the computed number of contiguous clusters.

    Abstract translation: 公开了用于访问存储在存储设备中的文件的几种系统和方法。 在一个实施例中,该方法包括访问与存储设备相关联的计算机文件系统中的文件分配表(FAT)。 FAT包括与分配给存储在存储装置中的文件的多个集群相对应的多个集群地址。 读取集群地址以标识下一个集群的位置。 读取集群地址中的一个或多个位以确定表示从多个集群中分配一组连续集群的签名值的存在。 如果签名值存在,则基于簇聚合地址后续的连续簇地址的预定数量来计算多个连续簇。 基于所计算的连续簇的数量,从存储设备读取连续簇的集合。

    METHODS AND APPARATUS FOR SELECTIVE ENCRYPTION OF EXECUTE IN PLACE (XIP) DATA

    公开(公告)号:US20250111059A1

    公开(公告)日:2025-04-03

    申请号:US18375372

    申请日:2023-09-29

    Abstract: An example apparatus includes: interface circuitry; and programmable circuitry configured to: obtain a set of processor instructions; select a first subset of processor instructions from the set; encrypt the first subset of processor instructions; select a second subset of processor instructions from the set; compute a plurality of message authentication codes (MACs) corresponding to the second subset of processor instructions; cause the interface circuitry to write the set of processor instructions to an external memory; and cause the interface circuitry to write a description of the first subset of processor instructions, a description of the second subset of processor instructions, and the plurality of MACs to the external memory.

    Protected Sensor Data Communication

    公开(公告)号:US20250047471A1

    公开(公告)日:2025-02-06

    申请号:US18362695

    申请日:2023-07-31

    Abstract: A network-communicating device with a signal input adapted to receive a sensor-derived signal; an analog-to-digital converter (ADC) having an input coupled to the signal input and an output; a data scrambling circuit having an input coupled to the output of the ADC and an output; a watermark insertion circuit having an input coupled to the output of the data scrambling circuit and an output; and a signal output coupled to the output of the watermark insertion circuit.

    Theft detector
    49.
    发明授权

    公开(公告)号:US12141337B2

    公开(公告)日:2024-11-12

    申请号:US18326176

    申请日:2023-05-31

    Abstract: An end-user computing device can include a theft detector that maintains a registered host device list containing identifiers of at least one registered host device. The theft detector can have root access to operations of the end-user device and the theft detector can provides a secure reboot request in response to detecting a possible theft condition. The end-user computing device can also include a boot loader that executes a secure reboot of the end-user device in response to a secure reboot request from the theft detector. The secure reboot of the end-user device resets the end-user device to prevent access to the end-user device.

Patent Agency Ranking