Patent application number | Description | Published |
20080215769 | Operational circuit - An operational circuit for performing an operation of an arbitrary number of input data pieces by using a DMA transfer according to a descriptor control and output results. The arbitrary number of input data pieces are divided into a plurality of pieces to perform an operation processing without performing the operation of the arbitrary number of input data pieces at a time. The operational circuit once stores an intermediate result for each of the divided operations in an external storage device, performs an operation processing read with an intermediate result in the next operation processing, and obtains a final result by repeating these operation processings. The operation is performed at a cyclic unit of processing corresponding to the number of address registers provided in the operational circuit. | 09-04-2008 |
20080294913 | DISK ARRAY CONTROLLER, DISK ARRAY CONTROL METHOD AND STORAGE SYSTEM - Provided is a disk array controller capable of speeding up the processing by simultaneously execution the encryption/decryption of a non parallel block cipher modes of operation. In a disk array controller for controlling a disk array according to a disk access request from a host system, a plurality of non parallel mode encryption/decryption target data are divided into a plurality of messages unrelated to the encryption/decryption processing, partitioning non parallel mode encryption/decryption target data belonging to the respective messages into a plurality of block data, storing each block data belonging to the respective messages by allocating it each line of Rnd[ | 11-27-2008 |
20090222798 | Information Processing Apparatus - A mobile device includes a memory for storing therein a subroutine management table to manage kinds of existing codes out of native code, first code and second code for a plurality of subroutines contained in content, a virtual machine, a precompile circuit for producing second code from first code and a subroutine management circuit for changing over processing in accordance with the kind of existing code for subroutine called up during execution of content. The subroutine management circuit judges kind of existing code with reference to the subroutine management table when the processing is changed over. | 09-03-2009 |
20100241771 | PERIPHERAL CIRCUIT WITH HOST LOAD ADJUSTING FUNCTION - A peripheral circuit with a host load adjusting function which is capable of readily carrying out control so that the amounts of data processed by the peripheral circuit and a host CPU are balanced by limiting interrupts made by the peripheral circuit, usage of a memory bus bandwidth, and a processing throughput of data. A typical embodiment of the present invention has an adjustment limitation setting unit setting a minimum value of an interval of interrupt requests generated by the peripheral circuit with the host load adjusting function, and a cycle counter counting generation timing of the interrupt requests, and compares a value of the cycle counter with the interval set in the adjustment limitation setting unit, thereby suppressing the interrupt requests generated at an interval shorter than the set interval. | 09-23-2010 |
20110289589 | UNAUTHORIZED OPERATION DETECTION SYSTEM AND UNAUTHORIZED OPERATION DETECTION METHOD - The content of operations is identified and an alert is generated to an operation having a high risk of information leakage. | 11-24-2011 |
20110320508 | COMPUTER SYSTEM MANAGEMENT METHOD AND CLIENT COMPUTER - The present invention efficiently displays in a tree structure form a file operation history. A file storage identifier, an operation identifier, and a count are stored as additional meta-information in an alternate data stream with respect to each file stored in a client terminal file system. The operation identifier manages a number of operations (operation generations). The count manages copy frequencies. This meta-information is also sent to a management apparatus, and used for displaying the file operation history in a tree structure form. | 12-29-2011 |
20110321170 | FRAUDULENT MANIPULATION DETECTION METHOD AND COMPUTER FOR DETECTING FRAUDULENT MANIPULATION - A client computer detects a user operation for transmitting data to a server or a storage device, determines whether the detected user operation is a fraudulent manipulation, and, if the determination is a positive result, performs security processing which is processing related to security of data to be transmitted. If the data is data within a group to which the user belongs and a destination of the data is a server or a storage device outside the group, the determination is a positive result. | 12-29-2011 |
20120191882 | DMA CONTROLLER - The DMA controller includes a peripheral device read unit to read states of peripheral devices, a state comparator, a transfer unit, a register, and a peripheral device write unit to write data in the peripheral devices according to the contents in the register when the DMA transfer is executed, an interrupt select unit selects one of plural interrupt signals to determine whether the peripheral device read unit, the state comparator and the transfer unit are at a timing to execute operations. Based on these operations the state comparator determines whether to start the DMA transfer, and the transfer unit executes data transfer between the peripheral devices. | 07-26-2012 |
20120210133 | DATA PROCESSING APPARATUS - In the configuration performing a data processing by a hardware processing circuit (accelerator), to provide a technology capable of improving a poorness of processing efficiency by multiple accesses to the data, the following solving means are provided. A network data processing accelerator of the present network data processing apparatus comprises processing units corresponding to each processing of an encryption/decryption, a message authentication, and a checksum, and in the data processing including a combination of each processing, accesses for the same data of the memory and the like through a bus I/F unit and the like is collected together into one time, and a pipeline processing is performed using the least common multiple of the data processing unit of each processing. | 08-16-2012 |
20120215908 | METHOD AND SYSTEM FOR DETECTING IMPROPER OPERATION AND COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM - An embodiment of this invention detects an improper operation to a file in a computer of a monitoring target in a computer system including a plurality of computers connected via a network. The monitoring target computer receives a file. The computer receives acquisition source information on the file transmitted from a different computer. The computer refers to information on improper operation requirements to determine whether transmission of the file meets the improper operation requirements or not, based on a combination of the acquisition source of the file indicated by the acquisition source information and a transmission destination of the file and if the improper operation requirements are met, it determines that the transmission of the file is an improper operation. | 08-23-2012 |
20120331186 | DMA CONTROLLER - The DMA controller includes a peripheral device read unit to read states of peripheral devices, a state comparator, a transfer unit, a register, and a peripheral device write unit to write data in the peripheral devices according to the contents in the register when the DMA transfer is executed, an interrupt select unit selects one of plural interrupt signals to determine whether the peripheral device read unit, the state comparator and the transfer unit are at a timing to execute operations. Based on these operations the state comparator determines whether to start the DMA transfer, and the transfer unit executes data transfer between the peripheral devices. | 12-27-2012 |
Patent application number | Description | Published |
20110154033 | ONLINE STORAGE SERVICE SYSTEM AND ITS DATA CONTROL METHOD - A WEB service providing server can execute WEB service processing using data provided by an online storage service providing server, and leaking of data at the WEB service providing server can be prevented. | 06-23-2011 |
20130232424 | USER OPERATION DETECTION SYSTEM AND USER OPERATION DETECTION METHOD - The present invention provides a system for detecting and recording a user operation with respect to a web application. This system extracts from an application screen both a character string input element for the user to input a character string and an execution instruction element for instructing the web application to execute a prescribed operation. This system infers the role of the character string input element and execution instruction element in the web application. This system associates the character string input element with the execution instruction element, and extracts an inputted character string, which is inputted to the character string input element. This system creates user operation record data, which is recorded with a user operation, based on template data and the inputted character string. | 09-05-2013 |
20130263222 | COMPUTER SYSTEM AND SECURITY MANAGEMENT METHOD - With a plurality of computer apparatuses connected to a network, operation log information, including an operation type and an output destination of a file, and acquisition source information indicating an acquisition source of the file are recorded based on a user's input/output operation; the acquisition source information is managed by relating it with an access authority over the acquisition source of the file; when the operation log information for the user's output operation exists in the operation log information, a range of the access authority over the acquisition source of an output target file, which is a target of the user's output operation, and an addressee user who can access an output destination of the output target file are specified; whether or not the addressee user belongs to the range of the access authority over the acquisition source of the output target file is judged; and if a negative judgment result is obtained, risk information indicating that the user's output operation is an output outside the range of the access authority. | 10-03-2013 |