Patent application number | Description | Published |
20150087031 | METHODS FOR TREATING LIGNOCELLULOSIC MATERIALS - The present invention relates to methods of processing lignocellulosic material to obtain hemicellulose sugars, cellulose sugars, lignin, cellulose and other high-value products. Also provided are hemicellulose sugars, cellulose sugars, lignin, cellulose, and other high-value products. | 03-26-2015 |
20150136121 | METHODS FOR TREATING LIGNOCELLULOSIC MATERIALS - The present invention relates to methods of processing lignocellulosic material to obtain hemicellulose sugars, cellulose sugars, lignin, cellulose and other high-value products. Also provided are hemicellulose sugars, cellulose sugars, lignin, cellulose, and other high-value products. | 05-21-2015 |
Patent application number | Description | Published |
20130326145 | METHODS AND APPARATUS FOR EFFICIENT COMMUNICATION BETWEEN CACHES IN HIERARCHICAL CACHING DESIGN - In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for implementing efficient communication between caches in hierarchical caching design. For example, in one embodiment, such means may include an integrated circuit having a data bus; a lower level cache communicably interfaced with the data bus; a higher level cache communicably interfaced with the data bus; one or more data buffers and one or more dataless buffers. The data buffers in such an embodiment being communicably interfaced with the data bus, and each of the one or more data buffers having a buffer memory to buffer a full cache line, one or more control bits to indicate state of the respective data buffer, and an address associated with the full cache line. The dataless buffers in such an embodiment being incapable of storing a full cache line and having one or more control bits to indicate state of the respective dataless buffer and an address for an inter-cache transfer line associated with the respective dataless buffer. In such an embodiment, inter-cache transfer logic is to request the inter-cache transfer line from the higher level cache via the data bus and is to further write the inter-cache transfer line into the lower level cache from the data bus. | 12-05-2013 |
20140208031 | APPARATUS AND METHOD FOR MEMORY-HIERARCHY AWARE PRODUCER-CONSUMER INSTRUCTIONS - An apparatus and method are described for efficiently transferring data from a producer core to a consumer core within a central processing unit (CPU). For example, one embodiment of a method comprises: A method for transferring a chunk of data from a producer core of a central processing unit (CPU) to consumer core of the CPU, comprising: writing data to a buffer within the producer core of the CPU until a designated amount of data has been written; upon detecting that the designated amount of data has been written, responsively generating an eviction cycle, the eviction cycle causing the data to be transferred from the fill buffer to a cache accessible by both the producer core and the consumer core; and upon the consumer core detecting that data is available in the cache, providing the data to the consumer core from the cache upon receipt of a read signal from the consumer core. | 07-24-2014 |
20140223105 | METHOD AND APPARATUS FOR CUTTING SENIOR STORE LATENCY USING STORE PREFETCHING - In accordance with embodiments disclosed herein, there are provided methods, systems, mechanisms, techniques, and apparatuses for cutting senior store latency using store prefetching. For example, in one embodiment, such means may include an integrated circuit or an out of order processor means that processes out of order instructions and enforces in-order requirements for a cache. Such an integrated circuit or out of order processor means further includes means for receiving a store instruction; means for performing address generation and translation for the store instruction to calculate a physical address of the memory to be accessed by the store instruction; and means for executing a pre-fetch for a cache line based on the store instruction and the calculated physical address before the store instruction retires. | 08-07-2014 |
20140380338 | Method And Apparatus To Protect A Processor Against Excessive Power Usage - In an embodiment, a processor includes at least a first core. The first core includes execution logic to execute operations, and a first event counter to determine a first event count associated with events of a first type that have occurred since a start of a first defined interval. The first core also includes a second event counter to determine a second event count associated with events of a second type that have occurred since the start of the first defined interval, and stall logic to stall execution of operations including at least first operations associated with events of the first type, until the first defined interval is expired responsive to the first event count exceeding a first combination threshold concurrently with the second event count exceeding a second combination threshold. Other embodiments are described and claimed. | 12-25-2014 |
Patent application number | Description | Published |
20100146212 | Accessing a cache memory with reduced power consumption - In one embodiment, a cache memory includes a data array having N ways and M sets and at least one fill buffer coupled to the data array, where the data array is segmented into multiple array portions such that only one of the portions is to be accessed to seek data for a memory request if the memory request is predicted to hit in the data array. Other embodiments are described and claimed. | 06-10-2010 |
20100169579 | READ AND WRITE MONITORING ATTRIBUTES IN TRANSACTIONAL MEMORY (TM) SYSTEMS - A method and apparatus for monitoring memory accesses in hardware to support transactional execution is herein described. Attributes are monitor accesses to data items without regard for detection at physical storage structure granularity, but rather ensuring monitoring at least at data items granularity. As an example, attributes are added to state bits of a cache to enable new cache coherency states. Upon a monitored memory access to a data item, which may be selectively determined, coherency states associated with the data item are updated to a monitored state. As a result, invalidating requests to the data item are detected through combination of the request type and the monitored coherency state of the data item. | 07-01-2010 |
20100169581 | EXTENDING CACHE COHERENCY PROTOCOLS TO SUPPORT LOCALLY BUFFERED DATA - A method and apparatus for extending cache coherency to hold buffered data to support transactional execution is herein described. A transactional store operation referencing an address associated with a data item is performed in a buffered manner. Here, the coherency state associated with cache lines to hold the data item are transitioned to a buffered state. In response to local requests for the buffered data item, the data item is provided to ensure internal transactional sequential ordering. However, in response to external access requests, a miss response is provided to ensure the transactionally updated data item is not made globally visible until commit. Upon commit, the buffered lines are transitioned to a modified state to make the data item globally visible. | 07-01-2010 |
20120072984 | REGULATING ATOMIC MEMORY OPERATIONS TO PREVENT DENIAL OF SERVICE ATTACK - In one embodiment, the present invention includes a method for identifying a termination sequence for an atomic memory operation executed by a first thread, associating a timer with the first thread, and preventing the first thread from execution of a memory cluster operation after completion of the atomic memory operation until a prevention window has passed. This method may be executed by regulation logic associated with a memory execution unit of a processor, in some embodiments. Other embodiments are described and claimed. | 03-22-2012 |
20120117334 | READ AND WRITE MONITORING ATTRIBUTES IN TRANSACTIONAL MEMORY (TM) SYSTEMS - A method and apparatus for monitoring memory accesses in hardware to support transactional execution is herein described. Attributes are monitor accesses to data items without regard for detection at physical storage structure granularity, but rather ensuring monitoring at least at data items granularity. As an example, attributes are added to state bits of a cache to enable new cache coherency states. Upon a monitored memory access to a data item, which may be selectively determined, coherency states associated with the data item are updated to a monitored state. As a result, invalidating requests to the data item are detected through combination of the request type and the monitored coherency state of the data item. | 05-10-2012 |
20140122811 | Method And Apparatus For Error Correction In A Cache - A processor includes a core to execute instructions and a cache memory coupled to the core and having a plurality of entries. Each entry of the cache memory may include a data storage including a plurality of data storage portions, each data storage portion to store a corresponding data portion. Each entry may also include a metadata storage to store a plurality of portion modification indicators, each portion modification indicator corresponding to one of the data storage portions. Each portion modification indicator is to indicate whether the data portion stored in the corresponding data storage portion has been modified, independently of cache coherency state information of the entry. Other embodiments are described as claimed. | 05-01-2014 |
20150089280 | RECOVERY FROM MULTIPLE DATA ERRORS - Mechanisms for handling multiple data errors that occur simultaneously are provided. A processing device may determine whether multiple data errors occur in memory locations that are within a range of memory locations. If the multiple memory locations are within the range of memory locations, the processing device may continue with a recovery process. If one of the multiple memory locations is outside of the range of memory locations, the processing device may halt the recovery process. | 03-26-2015 |
Patent application number | Description | Published |
20090002574 | Method and a system for optical design and an imaging device using an optical element with optical aberrations - A method for designing an imaging device. The method comprises receiving specification of a final image mapping a three-dimensional environment according to a predefined mapping and an optical unit with an optical aberration. The method further comprises estimating an optical design of the optical unit with the optical aberration. The optical unit is configured for projecting a uncorrected initial image according to the optical aberration. The method further comprises calculating an algorithmic correction for the uncorrected initial image. The algorithmic correction is designed for compensating for the effect of the optical aberration on the uncorrected initial image. The method further comprises manufacturing the imaging device. The manufactured imaging device having the optical design and applying the algorithmic correction on the uncorrected initial image, thereby outputting the final image without the effect produced by said optical aberration and with said predefined mapping. | 01-01-2009 |
20090005112 | Optical imaging system configurations for handheld devices - A mobile communication terminal that comprises a body having a minimum bounding box with a wide dimension that includes an image sensor and an imaging unit. The body comprises an image-capture aperture substantially perpendicular to the wide dimension. The imaging unit is configured for imaging an image captured via said image-capture aperture on said image sensor. | 01-01-2009 |
20090160965 | Image sensor having a diffractive optics element - An apparatus for generating a color image that comprises an image sensor having a plurality of light-sensitive elements having a light sensing area, each light-sensitive element is configured for measuring a value corresponding to an intensity of light at the related light sensing area. The apparatus further comprises a diffractive optics element that diffracts impinging light waves. Each one of the impinging light waves is diffracted according to its wavelength toward at least one of the light-sensitive elements. The apparatus further comprises an image processor that generates a color image by arranging the values. | 06-25-2009 |
20090180166 | Imaging using diffraction optics elements - An apparatus for manipulating a perceived distance of a display. The apparatus comprises a display having an actual distance from a point of view (POV) and a diffractive optics element for diffracting light waves emitted from the display toward the POV, thereby manipulating a perceived distance of the display for an observer at the POV. The perceived distance is different from the actual distance. | 07-16-2009 |
20090180187 | System and method for using diffractive elements for changing the optical pathway - An apparatus for adjusting an optical pathway, comprising a diffractive optics element configured for diffracting a plurality of light waves passing in the optical pathway, and a diffractive optics element (DOE) manipulator configured for manipulating said diffractive optics element, thereby changing the optical pathway. | 07-16-2009 |
20100110311 | METHOD AND SYSTEM FOR ADJUSTING A PRESENTATION OF IMAGE DATA - A handheld device configured for displaying a modulated image. The handheld device comprises an image generation unit configured for projecting at least one light. The at least one light beam corresponding to image data and allows a presentation of the image data to a user. The handheld device further comprises a user interface configured for receiving at least one instruction for adjusting a display of said image data from the user and a modulation unit configured for modulating the at least one light according to said at least one instruction during the presentation. | 05-06-2010 |
Patent application number | Description | Published |
20140013390 | SYSTEM AND METHOD FOR OUT-OF-BAND APPLICATION AUTHENTICATION - Application-to-Application authentication features using a second communication channel for out-of-band authentication separate from a communication channel of a request from a client to a server. Authentication information is associated with a component of the system such as the request or the client application, while being collected independent of interaction with the client application initiating the request. Implementations provide improved security over existing solutions using in-band or other means of collecting authentication information. | 01-09-2014 |
20150222639 | Maintaining Continuous Operational Access Augmented with User Authentication and Action Attribution in Shared Environments - A system and method for maintaining continuous operational access augmented with user authentication and action attribution in shared environments. Multiple users use the same machine/platform to perform their actions. The system includes an access control application and enforcement module that limit users' actions based on authentication and authority level, enabling each user to perform the user's role in the shared environment. In addition, the user's activities can be monitored, logged, and interfered with (such as terminating the session), enabling a key requirement of action attribution. | 08-06-2015 |
20150304292 | A SYSTEM AND METHOD FOR SECURE PROXY-BASED AUTHENTICATION - A system and method for secure authentication facilitates improving the security of authentication between a client and a target by using an innovative authentication module on a proxy. The client can connect to the proxy using a native protocol and provides client credentials to the proxy. The proxy uses an authentication module to authenticate the client and then to provide target access credentials for proxy-target authentication, thereby giving the client access to the target through the proxy. The invention facilitates connection between the client and the target without requiring the client to be in possession of the target access credentials. The proxy can optionally be connected to a privileged, access management system which can provide and/or store target access credentials. Proxy-provided target access credentials facilitate preventing a client security breech from exposing target access credentials. | 10-22-2015 |
Patent application number | Description | Published |
20150113600 | METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS TO AND USE OF NETWORK RESOURCES - Methods and systems are disclosed for detecting unauthorized actions associated with network resources, the actions including access to the resource and activity associated with the resource. The unauthorized actions are detected by analyzing action data of a client action associated with the network resource against credential retrieval data including records of authorized actions and/or procedures for performing an action associated with the network resource. | 04-23-2015 |
20150121461 | METHOD AND SYSTEM FOR DETECTING UNAUTHORIZED ACCESS TO AND USE OF NETWORK RESOURCES WITH TARGETED ANALYTICS - Methods and systems are disclosed for detecting improper, and otherwise unauthorized actions, associated with network resources, the actions including access to the resource and activity associated with the resource. The unauthorized actions are detected by analyzing action data of user actions employing accounts managed by a privileged access management system and associated with a network resource against profiles and rules to discover anomalies and/or deviations from rules associated with the network resource or accounts. | 04-30-2015 |
20150121518 | PRIVILEGED ANALYTICS SYSTEM - A computer-implemented method for determining whether a computer network is compromised by unauthorized activity on the computer network. The computer-implemented method comprises identifying a behavioral anomaly of an entity on the computer network, classifying the anomaly as a system event based on an assigned score for the anomaly being at least at a predetermined score threshold, updating an incident based on at least one common parameter between the system event and other system events which comprise the incident, each system event of the incident including an assigned score from when the event was an anomaly, updating a system status based on at least the incident, and assigning a system status score to the system status, and, determining whether the system status score is at least at a predetermined threshold system status score indicating that the computer network may be compromised. | 04-30-2015 |
20150150125 | CORRELATION BASED SECURITY RISK IDENTIFICATION - Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines. Access rights for accounts are collected, describing the access and operation permissions of these accounts on machines in the networks. A correlation is then performed to identify machines that can be accessed by employing credentials of accounts retrieved from other machines in the network. | 05-28-2015 |
20150200821 | MONITORING SESSIONS WITH A SESSION-SPECIFIC TRANSIENT AGENT - A method of monitoring a session on a target system includes receiving from a user client a user request to open a session with the target system. A session-specific transient agent for monitoring the session is installed onto the target system. The session is established between the user and the target system over a communication network. The transient agent monitors the session, collects data of events occurring on the target system during the session. The transient agent is terminated when the session ends. | 07-16-2015 |
20150271162 | SYSTEMS AND METHODS FOR CONTROLLING SENSITIVE APPLICATIONS - A method and system is provided for controlling a remote target application, including sensitive and privileged applications, via a remote application connection. The target application is executed with a set of credentials, different than those credentials submitted by the user to access the target application. The user, via a local client terminal, accesses the target application over the remote application connection, such that the user experience of interaction with the target application is similar to that of the target application running locally, while the target application is actually being run remotely. The execution is protected by the second set of credentials unknown to the user, thus preventing credential hijacking and various other threats to the sensitive application. | 09-24-2015 |
20150350238 | CORRELATION BASED SECURITY RISK IDENTIFICATION - Methods and systems are disclosed for identifying security risks, arising from credentials existing on machines in the networks that enable access to other machines on the networks. Account credentials indications are retrieved from machines in the network, which indicate that credentials for accounts are stored on those machines. Access rights for accounts are collected, describing the access and operation permissions of these accounts on machines in the networks. A correlation is then performed to identify machines that can be accessed by employing credentials of accounts retrieved from other machines in the network. | 12-03-2015 |
20160006712 | USER PROVISIONING - A method of credential provisioning on a target service utilizes three credential sets: authentication credentials, privileged credentials and provisioned credentials. An intermediate element receives a request from a user client to establish a session with a target service. The request includes authentication credentials. The intermediate element creates provisioned credentials using privileged credentials which are authorized for creating provisioned credentials for accessing the target service. Once provisioned credentials have been created, a dual session communication channel is established between the user client and the target service. The session between the user client and intermediate element is established using the authentication credentials and the session between the intermediate element and the target service is established using the provisioned credentials. Optionally, user authorization to establish a session with the target service is determined prior to creating the provisioned credentials. | 01-07-2016 |
20160006765 | CONNECTION-SPECIFIC COMMUNICATION MANAGEMENT - A method of managing a connection-specific policy for accessing a target system includes receiving a request from a user client for a connection with a target system. A unique identifier is determined for the requested connection. Connection settings for connecting to the target system are provided to the user client. The connection settings include the unique connection identifier. A corresponding access policy for the connection identifier is provided to the target system. The target system applies the corresponding access policy on the connection established with the connection settings. | 01-07-2016 |