$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Kernels, description tables and device drivers 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-013/10
출원번호 US-0531455 (1995-09-21)
발명자 / 주소
  • Adams Phillip M.
  • Holmstrom Larry W.
  • Jacob Steve A.
  • Powell Steven H.
  • Condie Robert F.
  • Culley Martin L.
출원인 / 주소
  • Iomega Corporation
대리인 / 주소
    McCarthy
인용정보 피인용 횟수 : 109  인용 특허 : 13

초록

Description tables can be linked to a kernel to form a device driver. The description tables can be device description tables and adapter description tables. The kernel is operating system dependent. The description tables are operating system independent and can be linked to other kernels for other

대표청구항

[ We claim:] [1.] An article of manufacture for use with a digital computer system, said digital computer system including:a central processor including a memory for storing instructions and data,an adapter attached to said central processor,a device attached to said adapter, andan operating system

이 특허에 인용된 특허 (13)

  1. Crupi Joseph A. (Eatontown NJ) Hayward David J. (Lincroft NJ) Jones David F. (Middletown NJ), Apparatus for locating programs resident on a cartridge of a cartridge programmable communication system.
  2. Clarey Thomas J. (Elburn IL) Havens Jeffrey L. (Aurora IL), Communication interface protocol.
  3. Advani Hira (Austin TX) Terrell William L. (Austin TX), Configuration capability for devices in an open system having the capability of adding or changing devices by user comma.
  4. Shah Bakul V. (Palo Alto CA) Maskevitch James A. (Palo Alto CA), Data processing system having automatic configuration.
  5. Advani Hira (Austin TX) Loucks Larry K. (Austin TX) Springen Nancy L. (Austin TX), Device driver and adapter binding technique.
  6. Heath Allen W. (Cedar Park TX) Hernandez Raymond (Austin TX) Hoffman Virginia M. (Austin TX) Sheppard Ronald K. (Austin TX) Stratton Susan D. (Austin TX), Emulation system for automatically modifying I/O translation tables in programs designed to run on different types of co.
  7. Bishop Thomas P. (Aurora IL) Davis Mark H. (Warrenville IL) Surratt Grover T. (West Chicago IL), Extended process for a multiprocessor system.
  8. Krakauer Arno S. (San Jose CA) Gawlick Dieter (Palo Alto CA) Colgrove John A. (Mountain View CA) Wilmot ; II Richard B. (Lafayette CA), File system for a plurality of storage classes.
  9. Fischer Michael A. (San Antonio TX), Input/output control technique utilizing multilevel memory structure for processor and I/O communication.
  10. Peek, Charles L.; Richey, Phillip C.; Summers, James H., Interactive code format transform for communicating data between incompatible information processing systems.
  11. Shirakabe Yoshihisa (Kunitachi JPX) Kondo Megumu (Kawasaki JPX) Nakaosa Yoshitake (Yokohama JPX) Yamada Hidenori (Hadano JPX) Ohashi Sadao (Hadano JPX) Ohchi Hideo (Kanagawa JPX), Method for generating an operating system by a static link-editor.
  12. den Boef Johannes H. (Eindhoven), Multiprocess computer and method for operating same having context switching in response to a peripheral interrupt.
  13. Laggis George E. (Naperville IL) Meyer Paul F. (Wheaton IL), User and application program transparent resource sharing multiple computer interface architecture with kernel process l.

이 특허를 인용한 특허 (109)

  1. Naito, Kazunori; Ito, Masahiro, Access control method for drive units, and a drive unit using the method.
  2. CP, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  3. Cp, Chandan; Narasimhan, Srinivasan, Agent assisted malicious application blocking in a network environment.
  4. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  5. Hitchcock Glenn Daniel ; Prissel Lee Patrick, Apparatus and method for self generating error simulation test data from production code.
  6. Alam,Akm Kamrul, Automatic configuration of a server.
  7. Sebes, E. John; Bhargava, Rishi, Classification of software on networked systems.
  8. Martinek,Michael G.; Jackson,Mark D.; Yoseloff,Mark L., Computerized gaming system, method and apparatus.
  9. Yoseloff, Mark L.; Jackson, Mark D.; Martinek, Michael G.; Brower, Donald A.; DeJournett, John L., Computerized gaming system, method and apparatus.
  10. Sebes, E. John; Bhargava, Rishi; Reese, David P., Connectivity-based authorization.
  11. Tester,Jonathan A., Controlling file operations.
  12. Curtis, Bryce Allen, Cross-platform program, system, and method having a system independent registry for use on operating systems irrespective of a registry equivalent.
  13. Hindsberg, Anders, Customizable frequency converter.
  14. Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; LeMay, Steven G.; Nelson, Dwayne R.; Palchetti, Johnny; Benbrahim, Jamal, Decoupling of the graphical presentation of a game from the presentation logic.
  15. Fehrer, Detlef; Heidepriem, Sebastian; Stadler, Edgar; Vollmer, Urs, Electronic apparatus for a bus system.
  16. Fehrer,Detlef; Heidepriem,Sebastian; Stadler,Edgar, Electronic apparatus for a bus system.
  17. Jackson, Mark D.; Martinek, Michael G., Encryption in a secure computerized gaming system.
  18. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  19. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  20. Roy-Chowdhury, Rahul; Sebes, E. John; Vaishnav, Jay, Enforcing alignment of approved changes and deployed changes in the software change life-cycle.
  21. Hall,Christopher J., Error handling scheme for time-critical processing environments.
  22. Bhargava, Rishi; Sebes, E. John, Execution environment file inventory.
  23. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  24. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  25. Bodin,William Kress; Hersey,Mark; Rogoyski,Jan, Generic virtual device driver.
  26. Bryce Allen Curtis ; Jimmy Ming-Der Hsu, Global registry object for mapping registry functions and registry equivalent functions across multiple operating systems in a cross-platform program.
  27. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  28. Ramanan, Venkata; Hunt, Simon, Herd based scan avoidance system in a network environment.
  29. Horikawa, Tsutomu; Hakamatani, Tadayasu, Kernel creator for creating kernel capable of executing entertainment processing using a peripheral device.
  30. Roth, Steven, Kernel module interface dependencies.
  31. Bae, Myung M.; DiNicola, Paul D.; Kim, Chulho; Sivaram, Rajeev, Locally providing globally consistent information to communications layers.
  32. Bae,Myung; DiNicola,Paul D.; Kim,Chulho; Sivaram,Rajeev, Locally providing globally consistent information to communications layers.
  33. Long Dean R. E. ; Hamilton Graham ; Fresko Nedim, Method and apparatus for embedding concatenated data files into object files during runtime in a virtual file system.
  34. Collin Zeev,ILX ; Tamir Tal,ILX, Method and apparatus for monitoring, controlling and configuring local communication devices.
  35. Collin Zeev,ILX ; Tamir Tal,ILX, Method and apparatus for monitoring, controlling, and configuring remote communication devices.
  36. Bhargava, Rishi; Vittal, Chiradeep; Saveram, Swaroop, Method and apparatus for process enforced configuration management.
  37. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  38. Bhargava, Rishi; Vittal, Chiradeep; Sayeram, Swaroop, Method and apparatus for process enforced configuration management.
  39. Bonola,Thomas J., Method and apparatus for providing seamless hooking and intercepting of selected kernel and HAL exported entry points.
  40. Bonola Thomas J., Method and apparatus for providing seamless hooking and intercepting of selected kernel and HAL exported entry points in an operating system.
  41. Thomas J. Bonola, Method and apparatus for providing seamless hooking and intercepting of selected kernel and hal exported entry points.
  42. Humpleman,Richard; Wang,Dongyan, Method and apparatus for universally accessible command and control information in a network.
  43. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of networked application client software by explicit human input.
  44. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  45. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  46. Sharma, Rosen; Shah, Bakul; Sebes, E. John, Method and system for containment of usage of language interfaces.
  47. Powers,Richard Dickert; Albrecht,Gregory Frank, Method and system for supporting virtual mappings for shared firmware.
  48. Jackson, Mark D., Method for developing gaming programs compatible with a computerized gaming operating system and apparatus.
  49. Wegener, Friedrich; Krumsiek, Dietmar; Kalhoff, Johannes, Method for parameterizing operating means.
  50. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for computer system denial-of-service protection.
  51. Bhargava, Rishi; Reese, Jr., David P., Method of and system for computer system state checks.
  52. Saraf, Suman; Agrawal, Sharad; Kumar, Pankaj, Method of and system for malicious software detection using critical address space protection.
  53. Saraf, Suman; Agrawal, Sharad; Srivastava, Vivek, Method of and system for reverse mapping vnode pointers.
  54. Johnson Russell A. ; Brown Andrew C. ; Johnson Stephen B., Method to allow hardware configurable data structures.
  55. Brown, Kevin; Murthy, Raghupathi Keshava, Method, system, and program for predicate processing by iterator functions.
  56. Yakovlev,Sergiy B., Methods and computer systems for selection of a DSDT.
  57. Yakovlev,Sergiy B., Methods and computer systems for selection of a DSDT.
  58. Yakovlev,Sergiy B., Methods and computer systems for updating values of a DSDT.
  59. Mishra, Ragendra; Kotte, Narasimhulu, Methods of transmitting non-SCSI commands involving loading opcode in command descriptor block (CDB) bytes and non-SCSI commands into remaining CDB bytes.
  60. Roth,Steven; Chandramouleeswaran,Aswin, Multiple saved kernel configurations.
  61. Fehrer,Detlef; Stadler,Edgar; Vollmer,Urs, Parameterization and diagnostic system for field devices.
  62. Martinek, Michael G.; Jackson, Mark D.; Downs, III, Justin G., Pass-through live validation device and method.
  63. Martinek,Michael G.; Jackson,Mark D.; Downs, III,Justin G., Pass-through live validation device and method.
  64. Adams Phillip M., Pin management of accelerator for interpretive environments.
  65. Phillip M. Adams, Pin management of accelerator for interpretive environments.
  66. Rowe, Richard E.; Moser, Timothy W.; Schaefer, Craig Michael; Iddings, Cara; Nelson, Dwayne R., Pluggable modular gaming modifiers and configuration templates for gaming environments.
  67. Miyachi, Christine M.; Zhang, John Y.; Wedekind, Gerald A.; Hasting, Thomas N., Protocol allowing modification of device attribute availability on a print network.
  68. Alexander, Randall W.; Hariharan, Seeta; Perlsweig, David M.; Rao, Sridhar; Sabhikhi, Ravinder K., Software architecture for managing a system of heterogenous network processors and for developing portable network processor applications.
  69. Alexander, Randall W.; Hariharan, Seeta; Perlsweig, David M.; Rao, Sridhar; Sabhikhi, Ravinder K., Software architecture for managing a system of heterogenous network processors and for developing portable network processor applications.
  70. Zeev Collin IL; Tal Tamir IL, Software modem having a multi-task plug-in architecture.
  71. Sebes, E. John, Solidifying the executable software set of a computer.
  72. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  73. Bhargava, Rishi; Reese, Jr., David P., System and method for clustering host inventories.
  74. Bhattacharjee, Rajbir; Munjal, Nitin; Singh, Balbir; Singh, Pankaj, System and method for critical address space protection in a hypervisor environment.
  75. Lin, Chieng Hwa; Rao, Sanjay, System and method for dynamic device driver support in an open source operating system.
  76. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  77. Dang, Amit; Mohinder, Preet, System and method for enforcing security policies in a virtual environment.
  78. Eslick, Ian S.; Williams, Mark; French, Robert S., System and method for executing hybridized code on a dynamically configurable hardware environment.
  79. Eslick,Ian S.; Williams,Mark; French,Robert S., System and method for executing hybridized code on a dynamically configurable hardware environment.
  80. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for host-initiated firewall discovery in a network environment.
  81. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  82. Cooper, Geoffrey Howard; Diehl, David Frederick; Ma, Robert, System and method for interlocking a host and a gateway.
  83. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  84. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  85. Cooper, Geoffrey Howard; Diehl, David Frederick; Mahadik, Vinay A.; Venugopalan, Ramnath, System and method for interlocking a host and a gateway.
  86. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  87. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  88. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  89. Dang, Amit; Mohinder, Preet; Srivastava, Vivek, System and method for kernel rootkit protection in a hypervisor environment.
  90. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  91. Bhargava, Rishi; Reese, Jr., David P., System and method for local protection against malicious software.
  92. Goodman, Brian Gerard; Jesionowski, Leonard George, System and method for logically assigning unique names to devices in a storage system.
  93. Sawhney, Harvinder Singh; Saraf, Suman; Sharma, Rosen, System and method for managing virtual machine configurations.
  94. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  95. Bhargava, Rishi; Reese, Jr., David P., System and method for network level protection against malicious software.
  96. Bhargava, Rishi; Reese, Jr., David P., System and method for passive threat detection using virtual memory inspection.
  97. Agarwal, Sonali; Tarbotton, Lee Codel Lawson, System and method for preventing data loss using virtual machine wrapped applications.
  98. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  99. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  100. Cooper, Geoffrey; Green, Michael W.; Guzik, John Richard, System and method for redirected firewall discovery in a network environment.
  101. Bhargava, Rishi; Reese, Jr., David P., System and method for selectively grouping and managing program files.
  102. Manley, Stephen L.; Chen, Raymond C.; Edwards, John K., System and method for storage of snapshot metadata in a remote file.
  103. Marsland Timothy P., System and method for tracing device drivers using a computer.
  104. Viswanathan Srinivasan ; Nazari Siamak ; Swaroop Anil ; Khalidi Yousef, System and method for transparent, global access to physical devices on a computer cluster.
  105. Xing,Lisheng, System and method of supporting kernel functionality.
  106. Savov,Andrey I.; Yeung,Michael, System for accessing digital imaging devices.
  107. Yodaiken, Victor; Dougan, Cort, Systems and methods for dynamically linking application software into a running operating system kernel.
  108. McCann, Peter J.; Gould, Christopher M., Universal module model.
  109. Ionescu, Ion-Alexandru; Robinson, Loren C., User-mode component injection and atomic hooking.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로