Computers or microchips with a hardware side protected by a primary internal hardware firewall and an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary inner hardware firewalls
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-015/16
G06F-009/00
출원번호
US-0364745
(2009-02-03)
등록번호
US-8209373
(2012-06-26)
발명자
/ 주소
Ellis, III, Frampton E.
출원인 / 주소
Ellis, III, Frampton E.
대리인 / 주소
DLA Piper LLP US
인용정보
피인용 횟수 :
19인용 특허 :
136
초록▼
A personal computer or microchip comprising: a primary internal hardware firewall separating a protected side of the computer's hardware from a network side connected to a network of computers. A master controller and/or a microprocessor is located within the hardware protected side protected by the
A personal computer or microchip comprising: a primary internal hardware firewall separating a protected side of the computer's hardware from a network side connected to a network of computers. A master controller and/or a microprocessor is located within the hardware protected side protected by the primary internal hardware firewall. Microprocessors are located within the network side located between the primary internal hardware firewall and the network connection. The network side microprocessors are separate components from the primary internal hardware firewall. The primary internal hardware firewall by its location does not restrict access by the network to the computer's network side, thereby enabling network operations between the computer and the network to be conducted in the network side using the networked microprocessors. One or more secondary inner hardware firewalls form one or more separate hardware protected compartments in the network side, the compartments including for example a networked microprocessor.
대표청구항▼
1. A computer configured for direct personal use by an individual, comprising: at least a primary internal hardware firewall configured to protect a hardware protected side of the computer's hardware from a network side of the computer, said network side is not protected by said primary internal har
1. A computer configured for direct personal use by an individual, comprising: at least a primary internal hardware firewall configured to protect a hardware protected side of the computer's hardware from a network side of the computer, said network side is not protected by said primary internal hardware firewall, at least one master controlling device and at least a non-volatile memory is located within said hardware protected side;one or more network side microprocessors with at least a volatile memory and at least one network communication component are located within said network side, said network side being configured for connection to the network of computers and being located between said primary internal hardware firewall and a wired or wireless network connection to said network of computers; said one or more network side microprocessors being separate components from said one or more network communications components, and both said network side microprocessors and said at least one network communication component being separate from said primary internal hardware firewall;said primary internal firewall by its location does not restrict access by the network to said network side of the computer, thereby enabling network operations between the computer and the network to be conducted in said network side using said network side microprocessors;at least one secondary inner hardware firewall configured to form at least one separate hardware protected compartment located in the network side; and at least one said network side microprocessor with at least a volatile memory is located in said separate hardware protected compartment located in said network side. 2. The computer of claim 1, wherein said primary internal hardware firewall is configured to deny access to said hardware protected side of the computer by said network. 3. The computer of claim 1, further comprising a second said secondary inner hardware firewall configured to form at least a second said separate hardware protected compartment located in said network side; and at least one said network side microprocessor with at least a volatile memory is located in said second separate hardware protected compartment located in said network side. 4. The computer of claim 3, further comprising a third said secondary inner hardware firewall configured to form third said separate hardware protected compartment located in said network side; and at least one said network side microprocessor with at least a volatile memory is located in said third separate hardware protected compartment located in said network side. 5. The computer of claim 4, further comprising at least four additional said secondary inner hardware firewalls configured to form at least four additional said separate hardware protected compartments located in said network side; and at least four additional said network side microprocessors each with at least a volatile memory, and each said additional network side microprocessors with said volatile memory is located in a separate one of said four additional separate hardware protected compartments located in said network side. 6. The computer of claim 1, further comprising a second said secondary inner hardware firewall configured to form a first said separate hardware protected compartment located in said hardware protected side; and at least one microprocessor is located in said first separate hardware protected compartment located in said hardware protected side. 7. The computer of claim 6, further comprising a third said second inner hardware firewall configured to form at least a second said separate hardware protected compartment located in said hardware protected side; and at least one memory component is located in said second separate hardware protected compartment located in the hardware protected side. 8. The computer of claim 7, further comprising at least four additional said secondary inner hardware firewalls configured to form at least four additional said separate hardware protected compartments located in said hardware protected side; and at least four additional memory components each located in one said additional separate hardware protected compartment located in said hardware protected side. 9. The computer of claim 1, wherein one said master controlling device includes at least one microprocessor. 10. The computer of claim 1, further comprising a memory component of the computer located in at least one said separate hardware protected compartment that is located in the network side, said separate hardware protected compartment being protected at least by an additional said secondary inner hardware firewall. 11. The computer of claim 1, wherein each said network side microprocessor is located in a separate one of said at least one said separate hardware protected compartment located in said network side. 12. The computer of claim 1, wherein at least a portion of operating system files of the computer is located inside at least three additional said separate hardware protected compartments, each said additional separate hardware protected compartment being protected by at least an additional said secondary inner hardware firewall. 13. The computer of claim 1, wherein at least a portion of application software files of the computer is located inside at least three additional said separate hardware protected compartments, each said additional separate hardware protected compartment being protected by at least an additional said secondary inner hardware firewall. 14. The computer of claim 1, wherein at least a portion of files of a user of the computer is located inside at least three additional said separate hardware protected compartments, each said additional separate hardware protected compartment being protected by at least an additional said secondary inner hardware firewall. 15. The computer of claim 1, wherein said one or more network communications components includes at least a digital signal processor or a modem. 16. The computer of claim 1, wherein the computer is a node in an array of other computers linked together as nodes to form a server and/or a mainframe and/or a supercomputer. 17. The computer of claim 1, wherein said computer is configured to enable at least one network user to utilize at least one of said network side microprocessors located in at least one said separate hardware protected compartment located in said network side. 18. A microchip configured for direct personal use by an individual, comprising: a microprocessor, the microprocessor including at least two processing units; andat least a primary internal hardware firewall configured to protect a protected hardware side of the microchip's hardware from a network side of the microchip, said network side is not protected by said primary internal hardware firewall, at least one of the processing units of the microprocessor is located within said hardware protected side of the microchip from a network side that is not protected by said primary internal hardware firewall;at least one of the processing units of the microprocessor is located within said hardware protected side;one or more of the processing units of the microprocessor is located within said network side, and said network side is configured for connection to the network of computers and being located between said primary internal hardware firewall and a wired or wireless network connection to said network of computers; said one or more network side processing units being separate from said primary internal hardware firewall;said primary internal firewall by its location does not restrict access by the network to said network side of the microchip, thereby enabling network operations between the microchip and the network to be conducted in said network side using said network side processing units of the microchip;at least one secondary inner hardware firewall is configured to form at least one separate hardware protected compartment located in the network side; andat least one said network side processing unit is located in said at least one separate hardware protected compartment located in said network side. 19. The microchip of claim 18, wherein said primary internal hardware firewall is configured to deny access to said hardware protected side of the microchip by said network. 20. The microchip of claim 18, further comprising a second said secondary inner hardware firewall configured to form at least a second said separate hardware protected compartment located in the network side; and at least one said network side processing unit is located in said second separate hardware protected compartment located in the network side. 21. The microchip of claim 20, further comprising a third said secondary inner hardware firewall configured to form at least a third said separate hardware protected compartment located in the network side; and at least one said network side processing unit is located in said third separate hardware protected compartment located in the network side. 22. The microchip of claim 21, further comprising at least four additional said secondary inner hardware firewalls configured to form at least four additional said separate hardware protected compartments located in the network side; and at least four additional said network side processing units, each located in a separate additional said separate hardware protected compartment. 23. The microchip of claim 18, further comprising a second said secondary inner hardware firewall configured to form a first said separate hardware protected compartment located in said hardware protected side; and at least one processing unit is located in said first separate hardware protected compartment located in said hardware protected side. 24. The microchip of claim 23, further comprising a third said secondary inner hardware firewall configured to form at least a second said separate hardware protected compartment located in said hardware protected side; and at least one memory component is located in said second additional separate hardware protected compartment located in said hardware protected side. 25. The microchip of claim 24, further comprising at least four additional said secondary inner hardware firewalls configured to form at least four additional said separate hardware protected compartments located in said hardware protected side; and at least four additional memory components are located in a separate said additional hardware protected compartment located in said hardware protected side. 26. The microchip of claim 18, wherein said at least one processing unit in said hardware protected side of the microchip includes a master control unit for the microchip. 27. The microchip of claim 18, further comprising a memory component of the microchip located in at least one said separate hardware protected compartment that is located in the network side, said separate hardware protected compartment being protected by at least said secondary inner hardware firewall. 28. The microchip of claim 18, wherein all said network side processing units are each located in a separate said hardware protected compartment. 29. The microchip of claim 18, wherein at least a portion of operating system files of the microchip is located inside at least three additional said separate hardware protected compartments, each additional said separate hardware protected compartment being protected by at least an additional said secondary inner hardware firewall. 30. The microchip of claim 18, wherein at least a portion of application software files of the microchip is located inside at least three additional said separate hardware protected compartments, each additional said separate hardware protected compartment being protected by at least an additional said secondary inner hardware firewall. 31. The microchip of claim 18, wherein at least a portion of files of a user of the microchip is located inside at least three additional said separate hardware protected compartments, each additional said separate hardware protected compartment being protected by at least an additional said secondary inner hardware firewall. 32. The microchip of claim 18, wherein said network side includes one or more network communication components. 33. The microchip of claim 32, wherein said one or more network communications components includes at least a digital signal processor or a modem. 34. The microchip of claim 32, wherein at least one said network communications component is located in said at least one separate hardware protected compartment within said network side. 35. The microchip of claim 18, wherein said internal hardware firewall denies access by said network to said hardware protected side of the microchip. 36. The microchip of claim 18, wherein the hardware protected side includes at least a non-volatile memory and the network side includes at least a volatile memory. 37. The microchip of claim 18, wherein said microchip is configured to enable at least one network user to utilize at least one of said network side processing units located in at least one said separate hardware protected compartment located in said network side. 38. A computer configured for direct personal use by an individual, comprising: at least a primary internal hardware firewall configured to protect a hardware protected side of the computer's hardware from a network side of the computer, said network side is not protected by said primary internal hardware firewall,at least one microprocessor and at least a non-volatile memory is located within said hardware protected side;one or more of said microprocessors with at least a volatile memory and at least one said network communications component are located within said network side, said network side being configured for connection to the network of computers and being located between said first internal hardware firewall and a wired or wireless network connection to said network of computers; said one or more network side microprocessors being separate components from said one or more network communications components, and both said network side microprocessors and said network communications components being separate from said primary internal hardware firewall;said primary internal firewall by its location does not restrict access by the network to said network side of the computer, thereby enabling network operations between the computer and the network to be conducted in said network side using said network side microprocessors of the computer;at least a secondary inner hardware firewall is configured to form at least one separate hardware protected component located in the network side; andat least one said network side microprocessor with at least a volatile memory is located in said at least one separate hardware protected compartment located in said network side. 39. The computer of claim 38, wherein said at least one microprocessor in said hardware protected side of the computer includes a master controlling device for the computer. 40. The computer of claim 38, wherein said one or more network communications components includes at least a digital signal processor or a modem. 41. The computer of claim 38, wherein said internal hardware firewall denies access by said network to said hardware protected side of the computer. 42. The computer of claim 38, wherein the computer is a node in an array of other computers linked together as nodes to form a server and/or a mainframe and/or a supercomputer. 43. The computer of claim 38, wherein said computer is configure to enable at least one network user to utilize at least one of said network side microprocessors located in at least one said separate hardware protected compartment located in said network side. 44. A microchip configured for direct personal use by an individual, comprising: at least one primary internal hardware firewall is configured to protect a hardware protected side of the microchip's hardware from a network side of the microchip, said network side is not protected by said primary internal hardware firewall, a master controlling unit of said microchip is located within said hardware protected side;a microprocessor including one or more of the processing units located within said network side, said network side being configured for connection to the network of computers and being located between said first internal hardware firewall and a wired or wireless network connection to said network of computers; said one or more network side processing units being separate from said primary internal hardware firewall;said primary internal firewall by its location does not restrict access by the network to said network side of the microchip, thereby enabling network operations between the microchip and the network to be conducted in said network side using said network side processing units of the microchip;at least one secondary inner hardware firewall is configured to form at least one separate hardware protected compartment located in said network side; andat least one said network side processing unit is located in said at least one separate hardware protected compartment located in said network side. 45. The microchip of claim 44, wherein said network side includes one or more network communication components. 46. The microchip of claim 44, wherein the hardware protected side includes at least a non-volatile memory and the unprotected side includes at least a volatile memory.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (136)
Nielsen Keith E. (Redondo Beach CA), Active energy control for diode pumped laser systems using pulsewidth modulation.
Benkeser Donald E. (Naperville IL) Cyr Joseph B. (Aurora IL) Greenberg Albert G. (Millburn NJ) Wright Paul E. (Basking Ridge NJ), Adaptive job scheduling for multiprocessing systems with master and slave processors executing tasks with opposite antic.
Bonneau ; Jr. Walt C. (Missouri City TX) Guttag Karl (Missouri City TX) Gove Robert (Dallas TX), Architecture of a chip having multiple processors and multiple memories.
Russell David S. (Minneapolis MN) Fischer Larry G. (Waseca MN) Wala Philip M. (Waseca MN) Ratliff Charles R. (Crystal Lake IL) Brennan Jeffrey (Waseca MN), Cellular communications system with centralized base stations and distributed antenna units.
Naedel Richard G. (Rockville MD) Harris David B. (Columbia MD) Uehling Mark (Bowie MD), Chassis and personal computer for severe environment embedded applications.
Berkowitz David B. (Palo Alto CA) Hao Ming C. (Los Altos CA) Lieu Hung C. (Santa Clara CA) Snow Franklin D. (Saratoga CA), Collaborative computing system using pseudo server process to allow input from different server processes individually a.
Sumimoto Shinji (Kawasaki JPX), Computer resource distributing method and system for distributing a multiplicity of processes to a plurality of computer.
Passera Anthony ; Thorp John R. ; Beckerle Michael J. ; Zyszkowski Edward S. A., Computer system and computerized method for partitioning data for parallel processing.
Jones Oliver (Andover MA) Deshon Mary (Winthrop MA) Ericsson Staffan (Brookline MA) Flach James (Cave Creek AZ), Computer teleconferencing method and apparatus.
Glick James A. (Granite Shoals TX) Graczyk Ronald B. (Round Rock TX) Nurick Albert F. (Austin TX) Fraley Brittain D. (Austin TX), Computing and multimedia entertainment system.
Morley Richard E. (Greenville NH), Digital computer with multi-processor capability utilizing intelligent composite memory and input/output modules and met.
Bruckert William F. (Northboro MA) Bissett Thomas D. (Derry NH) Riegelhaupt Norbert H. (Framingham MA), Dual-rail processor with error checking at single rail interfaces.
Rosenberry Steven (Reading PA), Dynamic fault-tolerant parallel processing system for performing an application function with increased efficiency using.
Pian Chao-Kuang (Anaheim CA) Habereder Hans L. (Orange CA), Dynamic task allocation in a multi-processor system employing distributed control processors and distributed arithmetic.
Pezeshki Bardia (Huntington Beach CA) Harris ; Jr. James S. (Stanford CA), Electrostatically tunable optical device and optical interconnect for processors.
Wilkinson Paul Amba ; Dieffenderfer James Warren ; Kogge Peter Michael ; Schoonover Nicholas Jerome, Fully scalable parallel processing system having asynchronous SIMD processing.
Nguyen Tam M. (Valhalla NY) Rana Deepak (Yorktown Heights NY) Ruiz Antonio (Yorktown Heights NY) Willner Barry E. (Briarcliff Manor NY), Hybrid digital/analog multimedia hub with dynamically allocated/released channels for video processing and distribution.
Fucito Michele (Meta ITX) Recchia Maruo (Rome ITX) Puglia Silvestro (Pomezia ITX) Mariani Claudio (Rome ITX) Colangeli Giulio (Gerenzano di Roma ITX) Rotunno Antonio (Salerno ITX), Interface unit for dynamically configuring a buffer in different modes to store data transfers based upon different conn.
Guy Charles B. (Hillsboro OR) Cadambi Sudarshan B. (Beaverton OR) Gutmann Michael J. (Portland OR) Bhasker Narjala (Portland OR) Trethewey Jim R. (Beaverton OR) McArdle Brian J. (Beaverton OR), Interrupt distribution scheme for a computer bus.
Wade Jon P. ; Cassiday Daniel R. ; Lordi Robert D. ; Steele ; Jr. Guy Lewis ; St. Pierre Margaret A. ; Wong-Chan Monica C. ; Abuhamdeh Zahi S. ; Douglas David C. ; Ganmukhi Mahesh N. ; Hill Jeffrey V, Massively parallel computer including auxiliary vector processor.
Kessler Richard E. ; Oberlin Steven M. ; Scott Steven L., Massively parallel processing system using two data paths: one connecting router circuit to the interconnect network an.
Bruckert William (Northboro MA) Kovalcin David (Grafton MA) Bissett Thomas D. (Derry NH) Munzer John (Brookline MA) Mazur Dennis (Worcester MA) Mott ; Jr. Peter R. (Worcester MA) Dearth Glenn A. (Hud, Method and apparatus for controlling initiation of bootstrap loading of an operating system in a computer system having.
Ault Donald Fred ; Bender Ernest Scott ; Spiegel Michael Gary, Method and apparatus for creating a security environment for a user task in a client/server system.
Kisor Greg, Method and system including a central computer that assigns tasks to idle workstations using availability schedules and computational capabilities.
Rausch Dieter (Karlsruhe DEX), Method for preventing an overload when starting a multicomputer system and multicomputer system for carrying out said me.
Shorter David U. (Lewisville TX), Method for scheduling execution of distributed application programs at preset times in an SNA LU 6.2 network environment.
Harris Jonathan P. (Littleton MA) Leibholz Daniel (Watertown MA) Miller Brad (Westborough MA), Method of dynamically allocating processors in a massively parallel processing system.
Hu Ming K. (Syracuse NY) Jia Yau G. (Nanjing ; Jiangsu CNX), Microprogram-coupled multiple-microprocessor module with 32-bit byte width formed of 8-bit byte width microprocessors.
Barker Thomas Norman ; Collins Clive Allan ; Dapp Michael Charles ; Dieffenderfer James Warren ; Knowles Billy Jack ; Rolfe David Bruce, N-dimensional modified hypercube.
Hodge Winston W. (Yorba Linda CA) Taylor Lawrence E. (Anaheim CA), Near-video-on-demand digital video distribution system utilizing asymmetric digital subscriber lines.
Georgiou,Christos J.; Gregurick,Victor L.; Nair,Indira; Salapura,Valentina, Network processor system on chip with bridge coupling protocol converting multiprocessor macro core local bus to peripheral interfaces coupled system bus.
Hinsley Christopher Andrew,GBX, Operating system for use with computer networks incorporating one or more data processors linked together for parallel p.
Chin Danny (Robbinsville NJ) Sauer Donald J. (Allentown NJ) Meyerhofer Dietrich (Princeton NJ) Katsuki Kazuo (Hyogo JPX), Parallel digital processing system using optical interconnection between control sections and data processing sections.
Beatty Harry J. (Clinton Corners NY) Elmendorf Peter C. (Kingston NY) Gillis Roland R. (Ulster Park NY) Pramanick Ira (Wappingers Falls NY), Parallel execution of a complex task partitioned into a plurality of entities.
Beatty Harry John ; Elmendorf Peter Claude ; Gillis Roland Roberto ; Pramanick Ira, Parallel execution of a complex task partitioned into a plurality of entities.
Bahr James E. (Rochester MN) Corrigan Michael J. (Rochester MN) Knipfer Diane L. (Rochester MN) McMahon Lynn A. (Rochester MN) Metzger Charlotte B. (Elgin MN), Process for dispatching tasks among multiple information processors.
Nelson Darul J. ; Noval James V. ; Suarez Ricardo E. ; Aghazadeh Mostafa A., Processor card assembly including a heat sink attachment plate and an EMI/ESD shielding cage.
Gregerson Daniel P. ; Farrell David R. ; Gaitonde Sunil S. ; Ahuja Ratinder P. ; Ramakrishnan Krish ; Shafiq Muhammad ; Wallis Ian F., Scalable distributed computing environment.
Ohta Hiroyuki,JPX ; Miura Hideo,JPX ; Usami Mitsuo,JPX ; Kametani Masatsugu,JPX ; Zen Munetoshi,JPX ; Okamoto Noriaki,JPX, Semiconductor device having plural chips with the sides of the chips in face-to-face contact with each other in the same.
Danahy John J. ; Kinney Daryl F. ; Pulsinelli Gary S. ; Rose Lawrence J. ; Kumar Navaneet, Service-centric monitoring system and method for monitoring of distributed services in a computing network.
Hoover Russell D. (Rochester MN) Willis John C. (Rochester MN) Baldus Donald F. (Mazeppa MN) Ziegler Frederick J. (Rochester MN) Liu Lishing (Pleasantville NY), System and method for empty notification from peer cache units to global storage control unit in a multiprocessor data p.
Teper Jeffrey A. ; Koneru Sudheer ; Mangione Gordon ; Balaz Rudolph ; Contorer Aaron M. ; Chao Lucy, System and method for providing trusted brokering services over a distributed network.
Chasek Norman E. (24 Briar Brae Rd. Stamford CT 06903), System for developing real time economic incentives to encourage efficient use of the resources of a regulated electric.
Leclercq Thierry (Paris FRX) Sallio Patrick (Thorigne-Fouillard FRX), System for management of the usage of data consultations in a telecommunication network.
Choquier Philippe,FRX ; Peyroux Jean-Francios ; Griffin William J., System for on-line service in which gateway computer uses service map which includes loading condition of servers broad.
Shwed Gil,ILX ; Kramer Shlomo,ILX ; Zuk Nir,ILX ; Dogon Gil,ILX ; Ben-Reuven Ehud,ILX, System for securing the flow of and selectively modifying packets in a computer network.
Padgaonkar Ajay J. (Phoenix AZ) Mitra Sumit K. (Tempe AZ), System for single cycle transfer of unmodified data to a next sequentially higher address in a semiconductor memory.
Kraft Reiner ; Lu Qi ; Wisebond Marat, Task distribution processing system and the method for subscribing computers to perform computing tasks during idle time.
Ellis, Frampton E., Computer or microchip with a secure control bus connecting a central controller to volatile RAM and the volatile RAM to a network-connected microprocessor.
Ellis, Frampton E., Computer or microchip with a secure system BIOS and a secure control bus connecting a central controller to many network-connected microprocessors and volatile RAM.
Ellis, Frampton E., Computers and microchips with a faraday cage, with a side protected by an internal hardware firewall and unprotected side connected to the internet for network operations, and with internal hardware compartments.
Ellis, III, Frampton E., Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
Ellis, III, Frampton Erroll, Computers and microchips with a side protected by an internal hardware firewall and an unprotected side connected to a network.
Ellis, III, Frampton E., Computers or microchips with a hardware side protected by a primary internal hardware firewall leaving an unprotected hardware side connected to a network, and with multiple internal hardware compartments protected by multiple secondary interior hardware firewalls.
Ellis, Frampton E., Computers or microchips with a primary internal hardware firewall and with multiple internal harware compartments protected by multiple secondary interior hardware firewalls.
Ellis, III, Frampton E., Microchips with an internal hardware firewall protected portion and a network portion with microprocessors which execute shared processing operations with the network.
Ellis, III, Frampton E., Microchips with an internal hardware firewall that by its location leaves unprotected microprocessors or processing units which performs processing with a network.
Ellis, Frampton E., Personal computer, smartphone, tablet, or server with a buffer zone without circuitry forming a boundary separating zones with circuitry.
Richardson, John W.; Chouinard, David A.; Chouinard, legal representative, Karen, System and method for regulating communications to or from an application.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.