Abstract: A method is disclosed for determining a user's identity and creating a virtual session using the HTTP protocol without modifying the protocol or changing its stateless nature.
Abstract: A method is disclosed for determining a user's identity and creating a virtual session using the HTTP protocol without modifying the protocol or changing its stateless nature.
Abstract: A method for use in a multiprocessor computer system where data objects larger than the address space of a single task are mapped in main memory and the translation lookaside buffer (TLB) is maintained by user mode software is disclosed. The method uses lazy TLB updating that allows stale data to stay in the TLB until it needs to be purged.
Abstract: A system and method for controlling the access of users to a trusted computer system using an authentication and authorization database, containing information used to authenticate human users and information establishing what each user can do, and a number of software processes, including session initiation, authorization, credentials and database management daemons. The software processes are implemented in an independent fashion to prevent any process from performing an operation that would affect another process in an unauthorized way.
Type:
Grant
Filed:
March 28, 1997
Date of Patent:
August 10, 1999
Assignee:
Data General Corporation
Inventors:
William J. Meyers, Marc J. Fraioli, Jon F. Spencer
Abstract: A fast tag cache is an array to cache a limited set of identifiers specifying the residency and access rights to memory blocks and cache blocks contained in a node within a distributed memory system built using a cache coherent non-uniform memory access architecture. The purpose of the fast tag array is to ensure peak processor-memory bus throughput each node and minimize the amount of memory required to hold cache state information.
Abstract: A multiprocessor cache control uses ping-pong bits to reduces the number of invalidate cycles on a shared system bus in a multiprocessor system with a plurality of caches when data is being updated by multiple CPUs. The ping-pong bit is used predict when sharing is taking place and convert read-shared requests into read-exclusive requests.
Type:
Grant
Filed:
May 18, 1995
Date of Patent:
January 27, 1998
Assignee:
Data General Corporation
Inventors:
Jeffrey S. Kimmel, Elizabeth H. Reeves, Peter B. Everdell
Abstract: Unwanted information, such as commercials, is typically transmitted from a transmission station many times each day. The repetitive nature of such unwanted information is used by the present apparatus/method to distinguish unwanted information from normal programming.