$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for performing secure device communications in a peer-to-peer bus architecture 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-012/14
출원번호 US-0940551 (1997-09-30)
발명자 / 주소
  • Angelo Michael F.
  • Olarig Sompong P.
  • Wooten David R.
  • Driscoll Dan J.
출원인 / 주소
  • Compaq Computer Corp.
대리인 / 주소
    Conley, Rose & Tayon, P.C.Kowert
인용정보 피인용 횟수 : 285  인용 특허 : 24

초록

A system and method for performing secure peer-to-peer device communications on an I/O bus, such as a PCI bus, a Fiber Channel bus, an IEEE, 1394 bus or a Universal Serial Bus. The system includes a plurality of intelligent I/O devices, such as intelligent storage devices and/or controllers, communi

대표청구항

[ What is claimed is:] [1.] A method for protecting a first device coupled to an input/output (I/O) bus from being accessed in an unauthorized manner by a second device coupled to the I/O bus, the method comprising:transmitting to the first device a request to perform a peer-to-peer operation across

이 특허에 인용된 특허 (24)

  1. Pearce John J. (DelValle TX), Apparatus and method for limiting access to mass storage devices in a computer system.
  2. Iitsuka Hiroyuki (Katano JPX) Nishimura Takuya (Katano JPX), Data transfer system and method using data bus having bi-directional serial data line, clock line and bi-directional con.
  3. Boswell R. Stephen (Fridley MN), Distributed enterprise print controller.
  4. Yu Che-Fn (Chelmsford MA), Distributed security procedure for intelligent networks.
  5. Coley Christopher D. ; Wesinger ; Jr. Ralph E., Firewall system for protecting network elements connected to a public network.
  6. Benantar Messaoud ; Blakley ; III George Robert ; Nadalin Anthony Joseph, Information handling system, method, and article of manufacture for efficient object security processing by grouping obj.
  7. Liu Lynn Y. ; Lu Juan ; Wang Tao, Method and apparatus for authorizing remote internet access.
  8. Carter Stephen R., Method and apparatus for collaborative document control.
  9. Shipman Mark ; Christeson Orville, Method and apparatus for providing system security to personal computer systems using transparent system interrupt.
  10. Tai Tsung-Yuan Charles ; Andersen David B., Method and apparatus for supporting multipoint communications in a protocol-independent manner.
  11. Sixtus Timothy, Method and system for secure online transaction processing.
  12. Herzberg Amir ; Krawczyk Hugo Mario ; Kutten Shay ; Le An Van ; Matyas Stephen Michael ; Yung Marcel Mordechay, Method and system for the secured distribution of multimedia titles.
  13. Davis Derek L. (Phoenix AZ), Method for providing a roving software license from one node to another node.
  14. Angelo Michael F. ; Olarig Sompong P. ; Wisecup George D., Method for the secure remote flashing of the BIOS of a computer.
  15. Willens Steven M., Network access control system and process.
  16. Stillman Robert A. (Los Altos CA) Way James A. (Cupertino CA) Cable ; III Jesse F. (San Jose CA) Cooper David (Saratoga CA) Koskinen James (Seattle WA), Network link controller.
  17. Stillman Robert A. (Los Altos CA) Way James A. (Cupertino CA) Cable ; III Jesse F. (San Jose CA) Cooper David (Saratoga CA) Koskinen James (Seattle WA), Network link controller for dynamic designation of master nodes.
  18. Pearce John J. ; Jones Craig S., Operating system independent method for avoiding operating system security for operations performed by essential utilit.
  19. Burns Randal Chilton ; Chron Edward Gustav ; Long Darrell ; Reed Benjamin Clay, Secure array of remotely encrypted storage devices.
  20. Holden James M. (Valley Center CA) Levin Stephen E. (Poway CA) Wrench ; Jr. Edwin H. (San Diego CA), Support of limited write downs through trustworthy predictions in multilevel security of computer network communications.
  21. Otto George V. E., System and method for distributively propagating revisions through a communications network.
  22. Holden James M. ; Levin Stephen E. ; Nickel James O. ; Wrench Edwin H., System and method for providing multi-level security in computer devices utilized with non-secure networks.
  23. Akiyama Ryota,JPX ; Munakata Akio,JPX ; Koga Yuzuru,JPX ; Ishizaki Masayuki,JPX, System for and method of authenticating a client.
  24. Di Giulio Peter C. (Fairfield CT) Harman James L. (Southport CT) Lee David K. (Monroe CT) Ryan ; Jr. Frederick W. (New Haven CT), System for communicating with plural nodes in predetermined intervals depended on integers assigned and changed based up.

이 특허를 인용한 특허 (285)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  6. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  7. Robinson, Scott H.; Espinosa, Gustavo P.; Bennett, Steven M., Accessing private data about the state of a data processing machine from storage that is publicly accessible.
  8. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  11. Wheeler,Henry Lynn; Wheeler,Anne M., Account authority digital signature (AADS) system using transactional account information.
  12. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  13. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  14. Choi, Ki-young; Song, Jung-ho, Analog translator for IEEE 1394 and translating method thereof.
  15. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  16. Graunke, Gary L., Apparatus and method for distributing private keys to an entity with minimal secret, unique information.
  17. Brickell, Ernest F., Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information.
  18. Brickell,Ernest F., Apparatus and method for proving the denial of a direct proof signature.
  19. Kozuch,Michael A.; Sutton, II,James A.; Grawrock,David; Neiger,Gilbert; Uhlig,Richard A.; Burgess,Bradley G.; Poisner,David I.; Hall,Clifford D.; Glew,Andy; Smith, III,Lawrence O.; George,Robert, Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment.
  20. Bloesch, Anthony, Asset composition.
  21. Bloesch, Anthony, Asset composition.
  22. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  23. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Attestation key memory device and bus.
  24. Grawrock,David W., Attestation using both fixed token and portable token.
  25. Barnett, Barry Stanley, Authenticated access to storage area network.
  26. Glew,Andrew F.; Sutton,James A.; Smith,Lawrence O.; Grawrock,David W.; Neiger,Gilbert; Kozuch,Michael A., Authenticated code module.
  27. Patil, Abhishek; Jing, Xiangpeng; Liu, Aixin; Nguyen, Djung N., Authentication for a multi-tier wireless home mesh network.
  28. Landers, Jr., John David; Russell, Jr., Robert Eugene; Steiner, David John, Authentications integrated into a boot code image.
  29. Landers, Jr.,John David; Russell, Jr.,Robert Eugene; Steiner,David John, Authentications integrated into a boot code image.
  30. Jiang Jimmy Liu,SGX, Automated flight data management system.
  31. Whitaker, Martin, Broadcasting data across a bus in which data transmission can be delayed if a snooping device is not ready to receive.
  32. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  33. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  34. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  35. Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Bennett,Steven M.; Cota Robles,Erik; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard, Chipset support for managing hardware interrupts in a virtual machine system.
  36. Hamlin,Christopher L., Computer network comprising network authentication facilities implemented in a disk drive.
  37. Erhardt, Eduard, Computer system connected to a data communications network.
  38. Grawrock,David W., Connecting a virtual token to a physical token.
  39. Bennett,Steve; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Zou,Xiang; Kozuch,Michael A., Control over faults occurring during the operation of guest software in the virtual-machine architecture.
  40. Bennett,Steve; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael A., Control register access virtualization performance improvement in the virtual-machine architecture.
  41. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Controlling access to multiple memory zones in an isolated execution environment.
  42. Grawrock,David W., Creation and distribution of a secret value between two devices.
  43. Drerup, Bernard Charles; Siegmund, Jr., Richard; Wolford, Barry Joe, Data path master/slave data processing device apparatus.
  44. Drerup, Bernard Charles; Siegmund, Jr., Richard; Wolford, Barry Joe, Data path master/slave data processing device apparatus and method.
  45. Williams, Larry Lynn, Data storage device with data transformation capability.
  46. Kuwano,Hideyuki; Iitsuka,Hiroyuki, Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method.
  47. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  48. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  49. Schier,John E, Device, system, and method for capturing email borne viruses.
  50. Carpenter, Todd L., Direct peripheral communication for restricted mode operation.
  51. Hamlin,Christopher L., Disk drive employing a disk with a pristine area for storing encrypted data accessible only by trusted devices or clients to facilitate secure network communications.
  52. McLaughlin, Mark, Distributing presence information.
  53. Quraishi, Nadeem Ahmad; Lam, Rex Yinzok; Pickering, Robert Leland; Kuna, Venkata Dhananjaya; Patil, Sangshetty; LeMay, Steven G., Download procedures for peripheral devices.
  54. Ray,Kenneth; Kehl,Theodore, Dynamic substitution of USB data for on-the-fly encryption/decryption.
  55. Coffman, Jerrie L.; Rullman, Brad R., Efficiently exporting local device access onto a system area network using a direct-call interface.
  56. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  57. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  58. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  59. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  60. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  61. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S., File checking using remote signing authority via a network.
  62. Lieuallen, Brian R.; Horton, Noah, Flower-petal resolutions for PNRP.
  63. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  64. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Generating a key hieararchy for use in an isolated execution environment.
  65. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  66. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Generating isolated bus cycles for isolated execution.
  67. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  68. Keane, Tim; Seifert, Dean; Grahmann, Jonathan, Generation systems and methods for transaction identifiers having biometric keys associated therewith.
  69. Matsuzaki, Natsume; Abe, Toshihisa; Nakano, Toshihisa; Futa, Yuichi; Miyazaki, Masaya, Group formation/management system, group management device, and member device.
  70. Uhlig,Richard; Anderson,Andrew V.; Bennett,Steve; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert, Handling faults associated with operation of guest software in the virtual-machine architecture.
  71. Aissi,Selim, Hardware-assisted credential validation.
  72. Aissi, Selim; Smith, Ned McArthur; Wiseman, Willard M., Hardware-based credential management.
  73. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  74. Nakamura,Ikuo, Information processing apparatus, method thereof, network system, record medium, and program.
  75. Felsher, David Paul, Information record infrastructure, system and method.
  76. Kuroda,Kazuo; Moriyama,Yoshiaki; Hashimoto,Takashi; Naito,Akihiko, Information sending method and information sending apparatus, information receiving apparatus and information receiving method, information transmission system and information transmission method, an.
  77. Miller, Joseph P.; Olarig, Sompong P.; Stoddard, Donald J., Integrated circuit device/circuit board connection apparatus.
  78. Carbajal, John M.; Dittert, Eric R.; Drews, Paul C., Interface for ensuring system boot image integrity and authenticity.
  79. Cota-Robles, Eric C.; Glew, Andy; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine (VM) system.
  80. Cota-Robles, Eric C.; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael A.; Neiger, Gilbert; Uhlig, Richard, Invalidating translation lookaside buffer entries in a virtual machine system.
  81. Frank, Alexander; Hall, Martin H.; Phillips, Thomas G., Isolated computing environment anchored into CPU and motherboard.
  82. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  83. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  84. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  85. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  86. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing a secure environment using a chipset in isolated execution mode.
  87. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  88. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Milland, Managing a secure platform using a hierarchical executive architecture in isolated execution mode.
  89. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Managing accesses in a processor for isolated execution.
  90. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  91. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  92. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  93. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  94. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  95. Kozuch,Michael; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Schoenberg,Sebastian; Uhlig,Richard, Mechanism for providing power management through virtualization.
  96. Hall, Clifford D.; Campbell, Randolph L., Mechanism for remapping post virtual machine memory pages.
  97. Bennett,Steven M.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Neiger,Gilbert; Uhlig,Richard, Mechanism to control hardware interrupt acknowledgement in a virtual machine system.
  98. Fish, Andrew J., Mechanism to determine trust of out-of-band management agents.
  99. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  100. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  101. McKeen, Francis X.; Smith, Lawrence O.; Chaffin, Benjamin Crawford; Cornaby, Michael P.; Bigbee, Bryant, Mechanism to handle events in a machine with isolated execution.
  102. McKeen,Francis X.; Reneris,Ken; Grawrock,David W., Mechanism to secure computer output from software attack using isolated execution.
  103. Boyd, William Todd; Hufferd, John Lewis; Mena, III, Agustin; Recio, Renato John; Vega, Madeline, Mechanisms for creation/deletion of linear block address table entries for direct I/O.
  104. Brickell, Ernest; Graunke, Gary; Stevens, William A.; Vembu, Balaji, Method and apparatus for authenticated, recoverable key distribution with no database secrets.
  105. Blumenau Steven M., Method and apparatus for authenticating connections to a storage system coupled to a network.
  106. Poisner,David I.; Grawrock,David W.; Sutton,James A., Method and apparatus for communicating securely with a token.
  107. Cota Robles,Erik; Chou,Stephen; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Method and apparatus for constructing host processor soft devices independent of the host processor operating system.
  108. Bennett, Steven M.; Anderson, Andrew V.; Cota Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  109. Bennett, Steven M.; Anderson, Andrew V.; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Neiger, Gilbert; Uhlig, Richard, Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment.
  110. Angelo,Michael F.; McMahan,Larry N.; Powers,Richard D., Method and apparatus for initializing multiple security modules.
  111. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  112. Kozuch, Michael A.; Sutton, II, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  113. Kozuch, Michael A.; Sutton, James A.; Grawrock, David, Method and apparatus for loading a trustable operating system.
  114. Frank, Alexander; Duffus, James, Method and apparatus for measuring presentation data exposure.
  115. Raskin, Sofin; Wang, Michael; Porten, Joshua; Rezinsky, Alexander, Method and apparatus for performing transparent mass storage backups and snapshots.
  116. Blumenau,Steven M.; Fitzgerald,John T.; Madden, Jr.,John F., Method and apparatus for preventing unauthorized access by a network device.
  117. Blumenau, Steven M.; Ofer, Erez; Fitzgerald, John T.; McGillis, James M.; Lippitt, Mark C.; Vishlitzsky, Natan, Method and apparatus for providing data management for a storage system coupled to a network.
  118. Angelo,Michael F.; Neufeld,E David; Heisey,David, Method and apparatus for providing security for a computer system.
  119. Sharma, Maneesh; Thurber, Steven Mark, Method and apparatus for restricting input/output device peer-to-peer operations in a data processing system to improve reliability, availability, and serviceability.
  120. Raskin, Sofin; Wang, Michael; Porten, Joshua; Indenbaum, Alexander; Chin, Shaoan, Method and apparatus for securing computer interfaces.
  121. Wang, Michael; Porten, Joshua; Raskin, Sofin; Borisov, Mikhail, Method and apparatus for securing computer mass storage data.
  122. Porten, Joshua; Raskin, Sofin; Wang, Michael; Chin, Shaoan; Indenbaum, Alexander, Method and apparatus for securing computer video and audio subsystems.
  123. Anderson, Andrew V.; Kägi, Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  124. Anderson,Andrew V.; K��gi,Alain, Method and apparatus for supporting address translation in a virtual machine environment.
  125. Raskin, Sofin; Rezinsky, Alexander; Porten, Joshua; Wang, Michael, Method and apparatus for transparently encrypting and decrypting computer interface data.
  126. Neufeld,E. David; Angelo,Michael F., Method and apparatus to provide secure communication between systems.
  127. Cheston,Richard Wayne; Cromer,Daryl Carvis; Locker,Howard J.; Rhoades,David B.; Springfield,Randall S.; Ward,James P., Method and system for configuring the language of the BIOS in a computer system.
  128. Shrader, Theodore Jack London; Nadalin, Anthony Joseph; Rich, Bruce Arland; Yarsa, Julianne, Method and system for presentation and manipulation of PKCS authenticated-data objects.
  129. Shrader, Theodore Jack London; Nadalin, Anthony Joseph; Rich, Bruce Arland; Yarsa, Julianne, Method and system for presentation and manipulation of PKCS enveloped-data objects.
  130. Shrader, Theodore Jack London; Nadalin, Anthony Joseph; Rich, Bruce Arland; Yarsa, Julianne, Method and system for presentation and manipulation of PKCS signed-data objects.
  131. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Reneris, Ken; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind, Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set.
  132. Bouchier, Paul H.; Gilbert, Jr., Ronald E.; Koerber, Christine, Method and system for using a universal serial bus (USB) as a peer-to-peer network.
  133. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  134. Bajikar, Sundeep M., Method and system to provide a trusted channel within a computer system for a SIM device.
  135. Derek L. Davis ; Pranav Mehta, Method for BIOS authentication prior to BIOS execution.
  136. Bartram, Linda Ruth; Blackstock, Michael Anthony; Spaay, Henk Gerardus Maris, Method for context based discovery and filtering of portable collaborative networks.
  137. Bartram, Linda Ruth; Blackstock, Michael Anthony; Spaay, Henk Gerardus Maris, Method for context based discovery and filtering of portable collaborative networks.
  138. Blackstock, Michael A.; Watkins, Andrew D.; Spaay, Henk; George, Mathieu P.; Sawadsky, Nicholas J., Method for discovering and discriminating devices on local collaborative networks to facilitate collaboration among users.
  139. Kim, Do-hyoung; Na, Il-ju; Park, Jong-wook; Seong, Goan-soo, Method for managing a digital interface connection.
  140. Boyd,William Todd; Hufferd,John Lewis; Mena, III,Agustin; Recio,Renato J.; Vega,Madeline, Method for out of user space I/O with server authentication.
  141. Boyd,William Todd; Hufferd,John Lewis; Mena, III,Agustin; Recio,Renato John; Vega,Madeline, Method for out of user space block mode I/O directly between an application instance and an I/O adapter.
  142. Boyd,William Todd; Hufferd,John Lewis; Mena, III,Agustin; Recio,Renato John; Vega,Madeline, Method for query/modification of linear block address table entries for direct I/O.
  143. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jevasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  144. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Method for resolving address space conflicts between a virtual machine monitor and a guest operating system.
  145. Knowles, Michael; Tapuska, David; Kalougina, Tatiana, Method for training a server for content delivery based on communication of state information from a mobile device browser.
  146. Boyd, William Todd; Hufferd, John Lewis; Mena, III, Agustin; Recio, Renato John; Vega, Madeline, Method for user space operations for direct I/O between an application instance and an I/O adapter.
  147. Brickell,Ernie F., Method of confirming a secure key exchange.
  148. Bocking, Andrew; Hardy, Michael Thomas; Roberts, Phillip; Rawlins, Rudy; Hanson, Ronald, Method of customizing a standardized IT policy.
  149. Roberts, Phillip; Hanson, Ronald J. J.; Rawlins, Rudy Eugene, Method of customizing a standardized IT policy.
  150. Roberts, Phillip; Hanson, Ronald J.J.; Rawlins, Rudy Eugene, Method of customizing a standardized IT policy.
  151. Roberts, Phillip; Rawlins, Rudy; Hanson, Ron, Method of customizing a standardized IT policy.
  152. Chen, Liangshen; Zheng, Xiaojing; Du, Fan; Hu, Chen, Method of managing digital rights.
  153. Britton,Thomas George, Method, system, and program for determining a number of device addresses supported by a target device and configuring device addresses used by a source device to communicate with the target device.
  154. Wilson, Rodger P., Method, system, and program for encrypting files in a computer system.
  155. Maino,Fabio R.; DeSanti,Claudio, Methods and apparatus for confidentiality protection for Fibre Channel Common Transport.
  156. Slyva, William D.; Carraher, Gerard T.; An, Tuan Q.; Emerson, Jeff; McCain, Timothy F.; Thibodeau, Neil J.; Martin, Kristen D., Methods and apparatus for establishing communications with a data storage system.
  157. Albrecht, Mark; Wildgrube, Frank, Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage.
  158. Maino, Fabio R.; Di Benedetto, Marco; Desanti, Claudio, Methods and apparatus for security over fibre channel.
  159. Moran,Douglas R.; Hall,Clifford D.; Piazza,Thomas A.; Jensen,Richard W., Methods and arrangements to interface memory.
  160. Kean, Brian T., Methods and systems for electromagnetic initiation of secure transactions.
  161. Zarns, Michael L., Methods and systems for remotely accessing universal serial bus devices.
  162. Zarns,Michael L., Methods and systems for remotely accessing universal serial bus devices.
  163. Paintin, Scott; Marr, Lance; Kloosterman, Michelle; Loevenguth, Rebecca; Scott, Diane, Money transfer system and messaging system.
  164. Paintin, Scott; Marr, Lance; Kloosterman, Michelle; Loevenguth, Rebecca; Scott, Diane, Money transfer system and messaging system.
  165. Jing, Xiangpeng; Patil, Abhishek P.; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  166. Jing, Xiangpeng; Patil, Abhishek; Liu, Aixin; Nguyen, Djung N., Multi-tier wireless home mesh network with a secure network discovery protocol.
  167. Grawrock,David W., Multi-token seal and unseal.
  168. Hoffberg, Steven M., Multifactorial optimization system and method.
  169. Otsuka, Satoshi, Network device and network system.
  170. Wiseman, Simon Robert; Oak, Richard Andrew, Network security content checking.
  171. Boyd, William Todd; Hufferd, John Lewis; Mena, III, Agustin; Recio, Renato J.; Vega, Madeline, Out of user space I/O directly between a host system and a physical adapter using file based linear block address translation.
  172. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  173. Trent, Barry A.; Mandy, Edward R., Peer integrity checking system.
  174. Gupta, Rohit; Gavrilescu, Alexandru; Miller, John L.; Wheeler, Graham A., Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
  175. Gupta, Rohit; Gavrilescu, Alexandru; Miller, John L; Wheeler, Graham A, Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
  176. Miller, John L., Peer-to-peer network communication.
  177. Miller, John L., Peer-to-peer network information storage.
  178. Heinla, Ahti; Kasesalu, Priit, Peer-to-peer telephone system.
  179. Heinla, Ahti; Kasesalu, Priit, Peer-to-peer telephone system.
  180. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  181. Levy Paul S. ; Cornelius Steve, Physical layer security manager for memory-mapped serial communications interface.
  182. Ellison, Carl M.; Sutton, James A., Platform and method for establishing provable identities while maintaining privacy.
  183. Brickell,Ernie F., Platform and method for establishing trust without revealing identity.
  184. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for generating and utilizing a protected audit log.
  185. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for issuing and certifying a hardware-protected attestation key.
  186. Herbert,Howard C.; Grawrock,David W.; Ellison,Carl M.; Golliver,Roger A.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Platform and method for remote attestation of a platform.
  187. Grawrock,David W., Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations.
  188. Paniagua, Jr., Frank; Mody, Parag; Yassaie, Hossein, Powering an electrical device through a legacy adapter capable of digital communication.
  189. Moran, Douglas R.; Acharya, Satish; Bogin, Zohar; Galloway, Sean G., Prioritized address decoder.
  190. Boyd, William Todd; Hufferd, John Lewis; Mena, III, Agustin; Recio, Renato J.; Vega, Madeline, Processing user space operations directly between an application instance and an I/O adapter.
  191. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard, Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor.
  192. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  193. Poisner, David I., Protected configuration space in a protected environment.
  194. Poisner,David I., Protected configuration space in a protected environment.
  195. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  196. Ellison,Carl M.; Golliver,Roger A.; Herbert,Howard C.; Lin,Derrick C.; McKeen,Francis X.; Neiger,Gilbert; Reneris,Ken; Sutton,James A.; Thakkar,Shreekant S.; Mittal,Millind, Protecting software environment in isolated execution.
  197. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  198. Bennett,Steven M.; Anderson,Andrew V.; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K��gi,Alain; Neiger,Gilbert; Uhlig,Richard; Mondal,Sanjoy K.; Brandt,Jason, Providing support for single stepping a virtual machine in a virtual machine environment.
  199. Cota Robles,Erik C.; Flautner,Krisztian, Real-time scheduling of virtual machines.
  200. Uhlig,Richard; Neiger,Gilbert; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Bennett,Steven M, Reclaiming existing fields in address translation data structures to extend control over memory accesses.
  201. Traversat, Bernard A.; Abdelaziz, Mohamed M.; Duigou, Michael J.; Pouyoul, Eric; Hugly, Jean Christophe; Gong, Li; Yeager, William J.; Joy, William N.; Clary, Michael J., Relay peers for extending peer availability in a peer-to-peer networking environment.
  202. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  203. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  204. Wood, Matthew D.; Brickell, Ernie, Replacing blinded authentication authority.
  205. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  206. Ellison, Carl M.; Golliver, Roger A.; Herbert, Howard C.; Lin, Derrick C.; McKeen, Francis X.; Neiger, Gilbert; Sutton, James A.; Thakkar, Shreekant S.; Mittal, Millind; Reneris, Ken, Resetting a processor in an isolated execution environment.
  207. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  208. Levy Paul S. ; Cornelius Steve, Secure data communication over a memory-mapped serial communications interface utilizing a distributed firewall.
  209. Hamlin,Christopher L., Secure disk drive comprising a secure drive key and a drive ID for implementing secure communication over a public network.
  210. Knowles, Michael; Tapuska, David; Kalougina, Tatiana, Secure method of synchronizing cache contents of a mobile browser with a server.
  211. Knowles, Michael; Tapuska, David; Kalougina, Tatiana, Secure method of synchronizing cache contents of a mobile browser with a server.
  212. Marceau, Carla; Stillerman, Matthew A., Secure peer-to-peer object storage system.
  213. Rabeler, Thorwald, Security processor with bus configuration.
  214. Lambert, Timothy M.; Khatri, Mukund P., Selective management controller authenticated access control to host mapped resources.
  215. Lambert, Timothy M.; Khatri, Mukund P., Selective management controller authenticated access control to host mapped resources.
  216. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  217. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  218. Wheeler,Lynn Henry; Wheeler,Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  219. Grawrock,David W.; Poisner,David I., Sleep protection.
  220. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  221. Kagan, Michael; Gabbay, Freddy; Rabin, Eilan; Telem, Haggai, Software interface between a parallel bus and a packet network.
  222. Frank, Alexander; Steeb, Curt A.; Ahdout, Isaac P.; Duffus, James S.; Hall, Martin; Temple, Nicholas; Venkatachalam, Rajagopal; Phillips, Thomas; Xu, Zhangwei, Special PC mode entered upon detection of undesired state.
  223. Neiger,Gilbert; Anderson,Andrew V.; Bennett,Steven M.; Brandt,Jason; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; K채gi,Alain; Mondal,Sanjoy K.; Parthasarathy,Rajesh; Rodgers,Dion; Smith,Lawrence O.; Uhlig,Richard A., Support for nested fault in a virtual machine environment.
  224. Raskin, Sofin; Wang, Michael; Porten, Joshua; Chin, Shaoan, System and architecture for secure computer devices.
  225. Raskin, Sofin; Wang, Michael; Porten, Joshua; Chin, Shaoan, System and architecture for secure computer devices.
  226. Kahandaliyanage, Shawn, System and method for application program operation on a wireless device.
  227. Kahandaliyanage, Shawn, System and method for application program operation on a wireless device.
  228. Kahandaliyanage, Shawn R., System and method for application program operation on a wireless device.
  229. Barnabo, Christopher E.; Greenlee, Gordan G., System and method for authentication to an application.
  230. Barnabo,Christopher E.; Greenlee,Gordan G., System and method for authentication to an application.
  231. Cota Robles,Erik C.; Campbell,Randolph L.; Hall,Clifford D.; Neiger,Gilbert; Uhlig,Richard A., System and method for binding virtual machines to hardware contexts.
  232. Knowles, Michael; Tapuska, David; Kalougina, Tatiana, System and method for communicating state management between a browser user-agent and a server.
  233. Neiger, Gilbert; Bennett, Steven M.; Cota-Robles, Erik; Schoenberg, Sebastian; Hall, Clifford D.; Rodgers, Dion; Smith, Lawrence O.; Anderson, Andrew V.; Uhlig, Richard A.; Kozuch, Michael; Glew, Andy, System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time.
  234. Boyd,William Todd; Hufferd,John Lewis; Mena, III,Agustin; Recio,Renato John; Vega,Madeline, System and method for creation/deletion of linear block address table entries for direct I/O.
  235. Raciborski, Bohdan, System and method for delivery of a modular operating system.
  236. Hoffberg, Steven M., System and method for determining contingent relevance.
  237. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  238. Brickell,Ernie F., System and method for establishing trust without revealing identity.
  239. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  240. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  241. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  242. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  243. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  244. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  245. Sutton, II, James A.; Grawrock, David W., System and method for execution of a secured environment initialization instruction.
  246. Sutton, II,James A.; Grawrock,David W., System and method for execution of a secured environment initialization instruction.
  247. Sutton, James A; Grawrock, David W, System and method for execution of a secured environment initialization instruction.
  248. Allen, James P.; Grande, Marcus Bryan; Iyengar, Madhuranath Narasipur Krishna; Kovacs, Robert George; Neemidge, John Leslie; Robinson, Marshon Larapheal, System and method for improved handling of fiber channel remote devices.
  249. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  250. Scott,Robert Paxton, System and method for protecting network appliances against security breaches.
  251. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  252. Borisov, Mikhail; Raskin, Sofin; Wang, Michael; Porten, Joshua, System and method for remotely managing security and configuration of compute devices.
  253. Porten, Joshua; Raskin, Sofin; Wang, Michael; Borisov, Mikhail, System and method for remotely managing security and configuration of compute devices.
  254. Grawrock,David W.; Sutton, II,James A., System and method for resetting a platform configuration register.
  255. Binder, Yehuda, System and method for routing-based internet security.
  256. Binder, Yehuda, System and method for routing-based internet security.
  257. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  258. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  259. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  260. Little, Herbert Anthony; Clark, David; Owen, Russell Norman; Totzke, Scott William; Adams, Neil Patrick; Brown, Michael Stephen, System and method of installing software applications on electronic devices.
  261. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  262. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  263. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  264. Adams, Neil P.; Kirkup, Michael G.; Little, Herbert A.; Owen, Russell N., System and method of owner application control of electronic devices.
  265. Little, Herbert A.; Clark, David R., System and method of owner control of electronic devices.
  266. Little, Herbert A.; Clark, David R., System and method of owner control of electronic devices.
  267. Gunter, David V.; Shachaf, Leeon Moshe, System and method of transmitting encrypted packets through a network access point.
  268. Sheikh Tahir Q. ; Wallach Walter A., System for data and interrupt posting for computer devices.
  269. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  270. Bennett, Steven M.; Neiger, Gilbert; Anderson, Andrew V., Timer offsetting mechanism in a virtual machine environment.
  271. Cota Robles,Erik; Schoenberg,Sebastian; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Neiger,Gilbert; Uhlig,Richard, Tracking operating system process and thread execution and virtual machine execution in hardware or in a virtual machine monitor.
  272. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  273. Grawrock, David, Trusted platform module for generating sealed data.
  274. Poisner,David I., Trusted system clock.
  275. Thirumalai, Gokul P.; Ahdout, Isaac, Tuning product policy using observed evidence of customer behavior.
  276. Thirumalai, Gokul P.; Ahdout, Isaac P., Tuning product policy using observed evidence of customer behavior.
  277. Lam, Rex Yinzok; Quraishi, Nadeem Ahmad; LeMay, Steven G., USB software architecture in a gaming machine.
  278. Neiger,Gilbert; Bennett,Steven M.; K��gi,Alain; Jeyasingh,Stalinselvaraj; Anderson,Andrew V.; Uhlig,Richard; Cota Robles,Erik; Rodgers,Scott; Smith,Lawrence, Use of multiple virtual machine monitors to handle privileged events.
  279. Yasala,Raju; Brickell,Ernie F.; Eckardt,Donald J., Using authentication certificates for authorization.
  280. Grawrock,David W.; Sutton, II,James A., Validation of inclusion of a platform within a data center.
  281. Bennett,Steven M.; Anderson,Andrew V.; Jeyasingh,Stalinselvaraj; Kagi,Alain; Neiger,Gilbert; Uhlig,Richard; Kozuch,Michael; Smith,Lawrence; Rodgers,Scott, Vectoring an interrupt or exception upon resuming operation of a virtual machine.
  282. Knauerhase, Robert C.; Tewari, Vijay, Virtual machine management using processor state information.
  283. Knauerhase,Robert C.; Tewari,Vijay, Virtual machine management using processor state information.
  284. Neiger, Gilbert; Chou, Stephen; Cota-Robles, Erik; Jeyasingh, Stalinselvaraj; Kagi, Alain; Kozuch, Michael; Uhlig, Richard; Schoenberg, Sebastian, Virtual translation lookaside buffer.
  285. Neiger,Gilbert; Chou,Stephen; Cota Robles,Erik; Jeyasingh,Stalinselvaraj; Kagi,Alain; Kozuch,Michael; Uhlig,Richard; Schoenberg,Sebastian, Virtual translation lookaside buffer.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로