IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
US-0185724
(2008-08-04)
|
등록번호 |
US-8140910
(2012-03-20)
|
발명자
/ 주소 |
|
출원인 / 주소 |
- Phillip M. Adams & Associates
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
1 인용 특허 :
34 |
초록
▼
A system and method for a software override capability for enforcing a predetermined state for an otherwise hardware-programmable device. Software that may think it knows what it is doing may try to control a hardware device, but may not know about a hardware issue, such as another feature or defect
A system and method for a software override capability for enforcing a predetermined state for an otherwise hardware-programmable device. Software that may think it knows what it is doing may try to control a hardware device, but may not know about a hardware issue, such as another feature or defect requiring that the device stay in a certain state. The technique programmatically maintains a persistent hardware state independent of any other control software. To other software, the software layer of the invention is indistinguishable and inseparable from hardware. Nothing can slip in between. Any insertion attempt will be detected and disallowed. Features of the processor or system chips actually weld the software to the hardware, which feature disallows any software intervention between the welded software layer and the hardware.
대표청구항
▼
1. A method comprising: identifying a defective I/O controller comprising a data buffer having at least one storage element, the defective I/O controller allowing a write operation to the data buffer and a read operation from the data buffer, wherein the read operation reads the data buffer in an at
1. A method comprising: identifying a defective I/O controller comprising a data buffer having at least one storage element, the defective I/O controller allowing a write operation to the data buffer and a read operation from the data buffer, wherein the read operation reads the data buffer in an attempt to read data not yet written to the data buffer by the write operation;executing a first write operation to the data buffer;executing a first read operation from the data buffer; andpreventing the defective I/O controller from corrupting data by assuring that the first write operation is completed prior to allowing the first read operation. 2. The method of claim 1, wherein the assuring is performed by a function module. 3. The method of claim 2, further comprising inseparably connecting the function module to the defective I/O controller. 4. The method of claim 3, wherein the function module is implemented by at least one of hardware, software, and firmware. 5. The method of claim 4, wherein the data buffer is a FIFO. 6. The method of claim 5, wherein the defective I/O controller is a floppy diskette controller. 7. The method of claim 6, further comprising resisting, by a defense module, attempts by software to separate the function module from the defective I/O controller. 8. The method of claim 1, wherein the assuring is performed by a function module implemented by at least one of hardware, software, and firmware. 9. A method comprising: identifying a defective I/O controller comprising a data buffer having at least one storage element, the defective I/O controller allowing a read operation from the data buffer and a write operation to the data buffer, wherein the write operation writes over data read by the read operation;executing a first read operation from the data buffer;executing a first write operation to the data buffer; andpreventing the defective I/O controller from corrupting data by assuring that the first read operation has completed prior to allowing the first write operation. 10. The method of claim 9, wherein the assuring is performed by a function module. 11. The method of claim 10, further comprising inseparably connecting the function module to the defective I/O controller. 12. The method of claim 11, wherein the function module is implemented by at least one of hardware, software, and firmware. 13. The method of claim 12, wherein the data buffer is a FIFO. 14. The method of claim 13, wherein the defective I/O controller is a floppy diskette controller. 15. The method of claim 14, further comprising resisting, by a defense module, attempts by software to separate the function module from the defective I/O controller. 16. The method of claim 9, wherein the assuring is performed by a function module implemented by at least one of hardware, software, and firmware. 17. A method comprising: identifying a defective I/O controller comprising a data buffer having at least one storage element, the defective I/O controller allowing at least one of a first error, wherein a read operation reads the data buffer in an attempt to read data not yet written to the data buffer by a write operation, and a second error, wherein a write operation writes over data not yet read by a read operation;providing a function module;inseparably connecting the function module to the defective I/O controller;requesting a first operation comprising one of a first read operation from the data buffer and a first write operation to the data buffer;requesting, after requesting the first operation, a second operation comprising the other of the first read operation and the first write operation; andprecluding, by the function module, the first and second errors by assuring that the first operation is completed prior to allowing the second operation. 18. The method of claim 17, wherein the function module is implemented by at least one of hardware, software, and firmware. 19. The method of claim 18, wherein the data buffer is a FIFO. 20. The method of claim 19, wherein the defective I/O controller is a floppy diskette controller.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.