Patent application number | Description | Published |
20090070573 | Reliability platform configuration measurement, authentication, attestation and disclosure - A platform configuration measurement device including: a configuration register; means for executing extension processing in which a predetermined operation is performed on a content of the configuration register by using a given additional value, a hash value is obtained by applying a predetermined hash function to a value obtained by the predetermined operation, and the hash value is set for a new content of the configuration register; and measurement extension means for obtaining measured values, corresponding to predetermined components constituting a platform, by sequentially making predetermined measurement on the predetermined components, and for allowing the means for executing extension processing to execute the extension processing using the measured values as the additional values, random extension means is provided for allowing the means for executing extension processing to execute the extension processing using a random value as the additional value. | 03-12-2009 |
20100005304 | Security and ticketing system control and management - A security device of this invention includes a nonvolatile storage unit | 01-07-2010 |
20120185694 | INFORMATION PROCESSING APPARATUS, A SERVER APPARATUS, A METHOD OF AN INFORMATION PROCESSING APPARATUS, A METHOD OF A SERVER APPARATUS, AND AN APPARATUS EXECUTABLE PROGRAM - To provide an information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable program. | 07-19-2012 |
Patent application number | Description | Published |
20110119408 | METHOD AND SYSTEM FOR CONNECTING A HOST AND MULTIPLE STORAGE DEVICES FORMED BY OPTICAL INTERCONNECTS AND OPTICAL LINK CREATION METHOD - A connection scheme for connection from a host or the like to multiple storage devices via an optical link, and in particular to an optical connection scheme or an optical wiring scheme for realizing multiplexing/redundancy by utilizing branches of an optical link and the unidirectionality of the optical link. When a host or the like and multiple storage devices such as memories are optically connected via two or more optical couplers, a configuration is made in which a loop is provided between the two optical couplers by utilizing branches of the optical couplers and the unidirectionality of light. Accordingly, a configuration is adopted in which an IO controller makes a selection from among multiple operation modes. | 05-19-2011 |
20120027354 | BACKPLANE STRUCTURE ALLOWING SETTING OF EQUAL PEER-TO-PEER COMMUNICATION DISTANCE BETWEEN TWO BLADES ARBITRARILY INSERTED INTO A PLURALITY OF FIXEDLY ARRANGED SLOTS - A backplane, a method for making a backplane, and optical communication apparatuses. The backplane includes: a plurality of optical elements each selected from the group consisting of: (i) optical fibers, (ii) optical waveguides, and (iii) a combination thereof, where the plurality of optical elements have the same length, where the plurality of optical elements form at least one bundle, where the elements are bundled at both ends of the at least one bundle such that end portion lengths of the plurality of optical elements differ from each other, thus forming a broadcast-star topology, and where the plurality of optical elements is connected such that communication distance between at least two blades that can be inserted into the back plane is constant. | 02-02-2012 |
20120254850 | SYSTEM FOR INSPECTING INFORMATION PROCESSING UNIT TO WHICH SOFTWARE UPDATE IS APPLIED - A method and an inspection apparatus for inspecting an information processing unit to which software update is applied. The apparatus includes a collection component configured to collect the behavior, for a plurality of times of software update, of the information processing unit to which one software update is applied. The apparatus also includes a determination component configured to compare the behavior collected for the plurality of times of software update to one another to determine whether the behavior of the information processing unit after the one software update is applied thereto is normal. | 10-04-2012 |
20120254951 | PROVIDING PROTECTION AGAINST UNAUTHORIZED NETWORK ACCESS - A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation. | 10-04-2012 |
20120297452 | PROVIDING PROTECTION AGAINST UNAUTHORIZED NETWORK ACCESS - A system includes a detection unit configured to detect unauthorized access to one or more information processing apparatuses that are virtually implemented by virtual machines executed by a computer; an authorized network configured to transfer authorized access to the one or more information processing apparatuses from an external network; a honeypot network configured to transfer unauthorized access to the information processing apparatuses from the external network; and a control unit configured to connect the information processing apparatuses for which no unauthorized access has been detected to the authorized network, and connect the information processing apparatuses for which unauthorized access has been detected to the honeypot network; wherein the control unit shifts, in response to detecting unauthorized access by the detection unit, the corresponding information processing apparatus into a decoy mode in which the detected unauthorized access is disconnected from a normal operation. | 11-22-2012 |
Patent application number | Description | Published |
20140071785 | INTEGRITY CHECK OF MEASURED SIGNAL TRACE DATA - A method of monitoring signals is disclosed, wherein a plurality of command signals and address signals are consecutively expressed, as a measurement target. The method includes setting a strobe timing that has a predetermined initial value; calculating an error rate by monitoring the plurality of command signals, in accordance with the strobe timing; monitoring the plurality of address signals, and calculating a burst rate from a difference between the consecutive plurality of address signals, in accordance with the strobe timing; identifying timing where the calculated error rate and calculated burst rate are both optimized; and in the event the timing where both the calculated error rate and calculated burst rate are optimized cannot be identified, altering a predetermined value of the set strobe timing, and repeating the calculating, monitoring, and identifying. | 03-13-2014 |
20140075250 | INTEGRITY CHECK OF MEASURED SIGNAL TRACE DATA - A method of monitoring signals is disclosed, wherein a plurality of command signals and address signals are consecutively expressed, as a measurement target. The method includes setting a strobe timing that has a predetermined initial value; calculating an error rate by monitoring the plurality of command signals, in accordance with the strobe timing; monitoring the plurality of address signals, and calculating a burst rate from a difference between the consecutive plurality of address signals, in accordance with the strobe timing; identifying timing where the calculated error rate and calculated burst rate are both optimized; and in the event the timing where both the calculated error rate and calculated burst rate are optimized cannot be identified, altering a predetermined value of the set strobe timing, and repeating the calculating, monitoring, and identifying. | 03-13-2014 |