Abstract: Methods and systems for accessing information in and loading encrypted information to memory. A processor provides virtual address information to a memory management unit. In response, the memory management unit retrieves a key tag and physical address information corresponding to the virtual address information. The memory management unit then sends the key tag and physical address information to the processor. The processor then determines whether a memory location corresponding to the physical address information is encrypted based on the key tag, and retrieves a secret key using the key tag based on the determining. Thereafter, information read from the memory location is decrypted using the secret key.
Abstract: One embodiment of the present invention provides a system that facilitates determining server configurations based on an execution profile of an application. During operation, the system analyzes the application to develop an execution profile that specifies the number of times each primitive operation is executed. Next, the system estimates the amount of resources used by the application based on the number of times each primitive operation is executed. Finally, the system determines a server configuration based on the estimated amount of resources used by the application.
Abstract: Prediction of a clock skew for an incomplete integrated circuit design, includes (a) selecting a first metal layer having at least one clock design figure, (b) placing, for a minimum clock skew prediction, clock source locations on the clock design figure in accordance with a first predetermined minimum distance between adjacent clock source locations, (c) placing, for a maximum clock skew prediction, a clock source location on a largest clock design figure in the first layer, such that the clock source location has a largest distance from a via to a lower layer, and (d) placing, for an intermediate clock skew prediction, clock source locations on intersections between the clock design figure and a virtual clock grid created for the first metal layer, the virtual clock grid having a predetermined offset from a design boundary and a predetermined pitch between grid lines.
Abstract: Management of lightweight directory access protocol (LDAP) service may be accomplished through the use of remote mirroring and a unique application program interface (API). Both a primary and a secondary LDAP server are maintained. Any modification to the primary LDAP server is then mirrored on the secondary LDAP server. When a call is attempted on the primary server, if it fails, the call is retried on the secondary LDAP server. The API allows for specialized grammar for commands that permits the system to handle primary (and secondary) LDAP server failure.
Type:
Grant
Filed:
February 11, 2002
Date of Patent:
September 12, 2006
Assignee:
Sun Microsystems, Inc.
Inventors:
Ramachandra Bethmangalkar, Frederic E. Herrmann, Louay Gammo
Abstract: Provided are a method, system, and program for making resources available for access to a client. A list is provided indicating a plurality of resources to make available for access to clients over a network and the list is processed to determine resources. Attributes of the resources are determined and reference codes are generated for the determined resources based on the determined attributes. The reference codes are associated with the resources for which the codes were generated. In response to receiving a request to one reference code from the client, a determination is made from the resource associated with the requested reference code and returning the determined resource to the requesting client.
Abstract: A system and method for connecting pending and preset telephone calls to facilitate transitioning to a phone call. Embodiments of the present invention include a method for anticipating and connecting a telephone call comprising identifying a trigger action associated with an anticipated outgoing telephone call, retrieving a phone number associated with said trigger action, and automatically setting a programmable speed dial button wherein by selecting the speed dial button, said phone number associated with said trigger action is dialed.
Type:
Grant
Filed:
January 21, 2003
Date of Patent:
September 12, 2006
Assignee:
Sun Microsystems, Inc.
Inventors:
John C. Tang, Mark A. Bilezikjian, Nicole Y. Mordecai, James M. A. Begole, Brian K. Raymor
Abstract: A method and system for event publication and subscription with an event channel from user level and kernel level are disclosed. The system comprises an event channel. The event channel includes an event queue for an event sent by a publisher. Additionally, the event channel has a plurality of subscriber-based queues each corresponding to a subscriber. If the corresponding subscriber has subscribed to receive delivery of the event, the subscriber-based queue includes the event. Moreover, the event channel further comprises a dispatcher for dispatching based on filtering criteria the event to the subscriber-based queue if the corresponding subscriber has subscribed to receive delivery of the event, and a delivery mechanism for delivering the event from the subscriber-based queue to the corresponding subscriber. The publisher can be a user level publisher or a kernel level publisher. The subscriber can be a user level subscriber or a kernel level subscriber.
Type:
Grant
Filed:
May 30, 2003
Date of Patent:
September 12, 2006
Assignee:
Sun Microsystems, Inc.
Inventors:
Cynthia A. McGuire, Hans-Josef Hoffman, Frank Mueller
Abstract: An adjustment and calibration system for post-fabrication treatment of a phase locked loop input receiver is provided. The adjustment and calibration system includes at least one adjustment circuit, to which the phase locked loop input receiver is responsive, and a storage device that selectively stores control information (1) associated with a state of the adjustment circuit and/or (2) from a tester that writes such control information to the storage device, where the control information stored in the storage device is subsequently selectively read out in order to adjust the adjustment circuit to a state corresponding to the control information.
Type:
Grant
Filed:
May 17, 2002
Date of Patent:
September 12, 2006
Assignee:
Sun Microsystems, Inc.
Inventors:
Claude R. Gauthier, Brian Amick, Pradeep Trivedi, Dean Liu
Abstract: An apparatus for controlling removal of a component from a chassis may include an engaging member and a control member. The engaging member may engage a portion of the chassis when the component is withdrawn to a predetermined position in the chassis to inhibit removal of the component from the chassis. The control member may be operated to disengage the component from the chassis such that the user can remove the component from the chassis. The control member may be a handle that disengages the engaging member from the chassis when the handle is deployed.
Abstract: A graphical processing system comprising a computational unit and a shadow processing unit coupled to the computational unit through a communication bus. The computational unit is configured to transfer coordinates C1 of a point P with respect to a first space to the shadow processing unit. In response to receiving the coordinates C1, the shadow processing unit is configured to: (a) transform the coordinate C1 to determine map coordinates s and t and a depth value Dp for the point P, (b) access a neighborhood of depth values from a memory using the map coordinates s and t, (c) compare the depth value DP to the depth values of the neighborhood, (d) filter binary results of the comparisons to determine a shadow fraction, and (e) transfer the shadow fraction to the computational unit through the communication bus.
Type:
Grant
Filed:
March 3, 2003
Date of Patent:
September 12, 2006
Assignee:
Sun Microsystems, Inc.
Inventors:
Michael F. Deering, Michael G. Lavelle, Douglas C. Twilleager, Daniel S. Rice
Abstract: Provided are a method, system, program, and data structure for implementing a locking mechanism to control access to a shared resource. A request is received to access the shared resource. A determination is made of whether a first file has a first name. The first file is renamed to a second name if the first file has the first name. A second file is updated to indicate the received request in a queue of requests to the shared resource if the first file is renamed to the second name. An ordering of the requests in the queue is used to determine whether access to the shared resource is granted to the request. The first file is renamed to the first name after the second file is updated.
Abstract: A system and method is provided that allows an Intelligent Platform Management Interface (IPMI) controller (or another micro-controller that is not a dedicated I2C controller) to control various Inter Integrated Circuit (I2C) slave devices having I2C slave drivers without any modification of the I2C slave drivers on the I2C slave devices. The I2C slave devices can be managed without an external and/or a dedicated I2C master controller. In one embodiment, a translation module is provided to an IPMI micro-controller that can represent I2C interface to I2C device drivers. In another embodiment, the translation module can represent an interface for an IPMI controller to I2C device drivers located in one or more I2C devices and/or I2C controllers.
Abstract: Disclosed is a system, method, and article of manufacture for agent processing. In particular, an agent may be executed within an address space of an invoking process that invoked the agent or may be executed in a separate address space. While the agent is processing, the execution of the agent within the address space of the invoking process may be switched to execution of the agent within the separate address space. Similarly, while the agent is processing, the execution of the agent in the separate address space may be switched to execution of the agent in the address space of the invoking process. Moreover, if the invoking process terminates before completing processing, when the invoking process restarts, the invoking process redetermines which agents should be executed in separate address spaces based on information stored before the invoking process terminated.
Abstract: In response to source code that represents instructions for dynamically allocating memory to objects, a compiler/interpreter produces instructions that implement a garbage collector. The garbage collector operates in garbage-collection cycles, which include parallel-execution operations such as locating reachable objects. Each thread maintains a respective task queue onto which it pushes identifiers of objects thus found and from which it pops those identifiers in order to begin the tasks of locating the further objects to which objects specified by the thus-popped identifiers refer. A thread's access to its respective task queue ordinarily occurs on a last-in, first-out basis, but the access mode switches to a first-in, first-out basis if the number of task-queue entries exceeds a predetermined threshold.
Type:
Grant
Filed:
June 27, 2001
Date of Patent:
September 5, 2006
Assignee:
Sun Microsystems, Inc.
Inventors:
Nir N. Shavit, Steven K. Heller, Christine H. Flood
Abstract: A method, system and computer program for processing software modules is provided. Each software module has a version management file associated with it. A version management file includes a comment field for recording at least one tag. Each tag relates to an attribute of the associated software module and has an attribute value. In operation, when an attribute of a software module needs to be known, the comment field of the version management file of the software modules is searched for a predetermined tag. The attribute value that is associated with the predetermined tag is detected when said predetermined tag is found. Processing of the software module is then selectively effected in accordance with the attribute value when said predetermined tag is found, and in accordance with the lack of a predetermined tag when said predetermined tag is not found. The version management file includes history data defining current and prior versions of the software module.
Abstract: A method for detecting errors in streaming media devices is described. In one embodiment, when a command to write a block of data to a streaming media device is received, integrity metadata associated with the data block is attached to the data block and written to the streaming media device together with the data block. Subsequently, when a read command pertaining to this data block is received, new integrity metadata is determined and compared to the attached metadata. If the new integrity metadata does not match the attached metadata, an error message is generated.
Abstract: A method for a cache architecture simulation includes obtaining a first sample set for the cache architecture using a non-stationary Gaussian field model, performing a cache architecture simulation using the first sample set to produce a first set of simulation data, and fitting a first multivariate model to the first set of simulation data.
Abstract: A circuit for comparing a first match line and a second match line in a CAM circuit. The circuit includes a first keeper circuit having a first input coupled to the second match line and a second keeper circuit having a second input coupled to the first match line. The circuit also includes a third keeper circuit and a fourth keeper circuit. The first and third keeper circuits are coupled to the first match line so as to be capable of maintaining a first voltage level on the first match line. The second and fourth keeper circuits are coupled to the second match line so as to be capable of maintaining a second voltage level on the second match line.
Abstract: The legitimacy of an untrusted mechanism is verified by submitting a first set of information and a second set of information to the untrusted mechanism in an unpredictable sequence. For each submission of either the first set or the second set of information, a response is received from the untrusted mechanism. Each response is tested to determine if the response is correct for the information set submitted. If any of the responses from the untrusted mechanism is incorrect, then it is determined that the untrusted mechanism is not legitimate. Because the submission sequence is unpredictable, it is highly difficult if not impossible for an illegitimate untrusted mechanism to “fake” proper responses. As a result, this verification process provides an effective means for testing and verifying the legitimacy of the untrusted mechanism.
Abstract: Data exchange system includes at least one portable data processing unit with data communication processing and memory units, the latter including an executive program and one or more application descriptors, each application description including at least one interaction context comprising commands, data elements, data references, procedures, access conditions, and external references; the structure of the data elements and the data references as well as other references is chosen in such a way that a very efficient use of the restricted memory space of e.g. smart cards is obtained.