AR036214A1 - Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capa - Google Patents

Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capa

Info

Publication number
AR036214A1
AR036214A1 ARP020103051A ARP020103051A AR036214A1 AR 036214 A1 AR036214 A1 AR 036214A1 AR P020103051 A ARP020103051 A AR P020103051A AR P020103051 A ARP020103051 A AR P020103051A AR 036214 A1 AR036214 A1 AR 036214A1
Authority
AR
Argentina
Prior art keywords
application
storage area
access
limiting
file structure
Prior art date
Application number
ARP020103051A
Other languages
English (en)
Inventor
Stephen A Sprigg
Laurence Lundblade
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of AR036214A1 publication Critical patent/AR036214A1/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F12/00Accessing, addressing or allocating within memory systems or architectures
    • G06F12/14Protection against unauthorised use of memory or access to memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/78Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
    • G06F21/80Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
    • G06F21/805Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors using a security table for the storage sub-system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

El acceso de una aplicación a un almacenamiento es limitado a una base de uno por cada aplicación. A la aplicación se le otorga acceso a una porción de almacenamiento. La aplicación puede manipular dicha porción del almacenamiento mediante la creación de diferentes estructuras de archivos en dicha porción, modificando, leyendo y escribiendo en archivos contenidos en la misma. A la aplicación se le niega el acceso al área de almacenamiento fuera de la porción otorgada. De forma similar, otras aplicaciones almacenadas en el área de almacenamiento siguen un paradigma similar. En una forma de realización, el área de almacenamiento es una estructura de archivos jerárquica y las aplicaciones son almacenadas como hijos en la estructura de archivos. Las aplicaciones, sin embargo, son mapeadas para indicar que cada una está almacenada en la raíz de la estructura de archivos para evitar el acceso a otras áreas de la estructura de archivos. En otra forma de realización, la estructura de archivos soporta un directorio compartido en el cual múltiples aplicaciones están mapeadas, como también, como un directorio raíz pero en otro drive.
ARP020103051A 2001-08-13 2002-08-13 Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capa AR036214A1 (es)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US31217701P 2001-08-13 2001-08-13

Publications (1)

Publication Number Publication Date
AR036214A1 true AR036214A1 (es) 2004-08-18

Family

ID=23210217

Family Applications (1)

Application Number Title Priority Date Filing Date
ARP020103051A AR036214A1 (es) 2001-08-13 2002-08-13 Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capa

Country Status (16)

Country Link
US (1) US7921287B2 (es)
EP (1) EP1417602A4 (es)
JP (2) JP2005500608A (es)
KR (1) KR100538659B1 (es)
CN (1) CN1307581C (es)
AR (1) AR036214A1 (es)
BR (1) BR0211917A (es)
CA (1) CA2457617A1 (es)
HK (1) HK1070442A1 (es)
IL (1) IL160395A0 (es)
MX (1) MXPA04002494A (es)
NZ (1) NZ531200A (es)
PE (1) PE20030375A1 (es)
RU (1) RU2307388C2 (es)
TW (1) TWI236298B (es)
WO (1) WO2003017682A2 (es)

Families Citing this family (78)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040123147A1 (en) * 2002-12-19 2004-06-24 Christopher White Control of security or ease-of-use sensitivity for a wireless communication device
CN101901605B (zh) * 2002-12-20 2013-02-27 皇家飞利浦电子股份有限公司 用于划分光盘的用户存储空间的方法,信息存储方法和装置
GB0311537D0 (en) * 2003-05-20 2003-06-25 Safa John Controlling write access of an application to a storage medium
WO2005003938A1 (en) 2003-07-04 2005-01-13 Nokia Corporation Key storage administration
CN1867883A (zh) * 2003-10-13 2006-11-22 皇家飞利浦电子股份有限公司 按应用程序进行存储分配
US7076637B2 (en) * 2003-10-29 2006-07-11 Qualcomm Inc. System for providing transitions between operating modes of a device
US7814554B1 (en) * 2003-11-06 2010-10-12 Gary Dean Ragner Dynamic associative storage security for long-term memory storage devices
US7257580B2 (en) * 2004-02-24 2007-08-14 International Business Machines Corporation Method, system, and program for restricting modifications to allocations of computational resources
JP2005352908A (ja) 2004-06-11 2005-12-22 Ntt Docomo Inc 移動通信端末及びデータアクセス制御方法
US20060107327A1 (en) * 2004-11-16 2006-05-18 Sprigg Stephen A Methods and apparatus for enforcing application level restrictions on local and remote content
EP1836640A2 (en) 2004-12-21 2007-09-26 SanDisk Corporation Memory system with versatile content control
US8504849B2 (en) * 2004-12-21 2013-08-06 Sandisk Technologies Inc. Method for versatile content control
US20070168292A1 (en) * 2004-12-21 2007-07-19 Fabrice Jogand-Coulomb Memory system with versatile content control
WO2006069311A2 (en) * 2004-12-21 2006-06-29 Sandisk Corporation Control structure for versatile content control and method using structure
US20060242151A1 (en) * 2004-12-21 2006-10-26 Fabrice Jogand-Coulomb Control structure for versatile content control
US20060242066A1 (en) * 2004-12-21 2006-10-26 Fabrice Jogand-Coulomb Versatile content control with partitioning
US8601283B2 (en) * 2004-12-21 2013-12-03 Sandisk Technologies Inc. Method for versatile content control with partitioning
US8051052B2 (en) * 2004-12-21 2011-11-01 Sandisk Technologies Inc. Method for creating control structure for versatile content control
CN102981980A (zh) * 2004-12-21 2013-03-20 桑迪士克股份有限公司 用于在存储装置控制存取的方法
US20060242067A1 (en) * 2004-12-21 2006-10-26 Fabrice Jogand-Coulomb System for creating control structure for versatile content control
US7797727B1 (en) 2005-01-31 2010-09-14 Hewlett-Packard Development Company, L.P. Launching an application in a restricted user account
US8423788B2 (en) * 2005-02-07 2013-04-16 Sandisk Technologies Inc. Secure memory card with life cycle phases
US8321686B2 (en) * 2005-02-07 2012-11-27 Sandisk Technologies Inc. Secure memory card with life cycle phases
US8108691B2 (en) * 2005-02-07 2012-01-31 Sandisk Technologies Inc. Methods used in a secure memory card with life cycle phases
US8627068B1 (en) * 2005-04-29 2014-01-07 Hewlett-Packard Development Company, L. P. Selecting access authorities
US8849968B2 (en) 2005-06-20 2014-09-30 Microsoft Corporation Secure and stable hosting of third-party extensions to web services
US7805470B2 (en) * 2005-06-23 2010-09-28 Emc Corporation Methods and apparatus for managing the storage of content in a file system
US7743409B2 (en) * 2005-07-08 2010-06-22 Sandisk Corporation Methods used in a mass storage device with automated credentials loading
US8074288B2 (en) * 2005-07-15 2011-12-06 Microsoft Corporation Isolation of application-specific data within a user account
US20070043667A1 (en) * 2005-09-08 2007-02-22 Bahman Qawami Method for secure storage and delivery of media content
US7536540B2 (en) * 2005-09-14 2009-05-19 Sandisk Corporation Method of hardware driver integrity check of memory card controller firmware
US20070061597A1 (en) * 2005-09-14 2007-03-15 Micky Holtzman Secure yet flexible system architecture for secure devices with flash mass storage memory
JP5112327B2 (ja) * 2005-11-17 2013-01-09 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 独自仕様のデータを管理するシステム
US7921303B2 (en) * 2005-11-18 2011-04-05 Qualcomm Incorporated Mobile security system and method
US7664924B2 (en) * 2005-12-01 2010-02-16 Drive Sentry, Inc. System and method to secure a computer system by selective control of write access to a data storage medium
US20100153671A1 (en) * 2005-12-01 2010-06-17 Drive Sentry Inc. System and method to secure a computer system by selective control of write access to a data storage medium
US9600661B2 (en) 2005-12-01 2017-03-21 Drive Sentry Limited System and method to secure a computer system by selective control of write access to a data storage medium
US10503418B2 (en) 2005-12-01 2019-12-10 Drive Sentry Limited System and method to secure a computer system by selective control of write access to a data storage medium
US7917715B2 (en) * 2006-01-28 2011-03-29 Tallman Jr Leon C Internet-safe computer
US20070234330A1 (en) * 2006-03-01 2007-10-04 Microsoft Corporation Prevention of executable code modification
KR100843075B1 (ko) 2006-05-29 2008-07-03 삼성전자주식회사 데이터를 관리하는 장치 및 방법
US8117441B2 (en) * 2006-06-20 2012-02-14 Microsoft Corporation Integrating security protection tools with computer device integrity and privacy policy
US20080022395A1 (en) * 2006-07-07 2008-01-24 Michael Holtzman System for Controlling Information Supplied From Memory Device
US20080010458A1 (en) * 2006-07-07 2008-01-10 Michael Holtzman Control System Using Identity Objects
US8140843B2 (en) * 2006-07-07 2012-03-20 Sandisk Technologies Inc. Content control method using certificate chains
US8613103B2 (en) * 2006-07-07 2013-12-17 Sandisk Technologies Inc. Content control method using versatile control structure
US8639939B2 (en) * 2006-07-07 2014-01-28 Sandisk Technologies Inc. Control method using identity objects
US8245031B2 (en) 2006-07-07 2012-08-14 Sandisk Technologies Inc. Content control method using certificate revocation lists
US20100138652A1 (en) * 2006-07-07 2010-06-03 Rotem Sela Content control method using certificate revocation lists
US8266711B2 (en) * 2006-07-07 2012-09-11 Sandisk Technologies Inc. Method for controlling information supplied from memory device
US20080072058A1 (en) * 2006-08-24 2008-03-20 Yoram Cedar Methods in a reader for one time password generating device
US20080052524A1 (en) * 2006-08-24 2008-02-28 Yoram Cedar Reader for one time password generating device
WO2008036833A2 (en) * 2006-09-20 2008-03-27 Drive Sentry, Inc. Selective control of write access to a data storage medium
US7921270B2 (en) 2006-10-05 2011-04-05 Sandisk Il Ltd. Methods and systems for controlling access to a storage device
US8423794B2 (en) * 2006-12-28 2013-04-16 Sandisk Technologies Inc. Method and apparatus for upgrading a memory card that has security mechanisms for preventing copying of secure content and applications
US8789063B2 (en) 2007-03-30 2014-07-22 Microsoft Corporation Master and subordinate operating system kernels for heterogeneous multiprocessor systems
US20100122054A1 (en) * 2008-11-12 2010-05-13 Sandisk Il Ltd. Copy safe storage
US9104618B2 (en) * 2008-12-18 2015-08-11 Sandisk Technologies Inc. Managing access to an address range in a storage device
US8220004B2 (en) * 2009-04-17 2012-07-10 Nokia Corporation Method, apparatus and computer program product for sharing resources via an interprocess communication
US8271544B2 (en) * 2009-05-01 2012-09-18 Creative Technology Ltd Data file having more than one mode of operation
US8433296B2 (en) 2009-05-01 2013-04-30 Ryan Hardin Exclusive delivery of content within geographic areas
US8037404B2 (en) * 2009-05-03 2011-10-11 International Business Machines Corporation Construction and analysis of markup language document representing computing architecture having computing elements
US8225061B2 (en) * 2009-07-02 2012-07-17 Apple Inc. Method and apparatus for protected content data processing
US9052919B2 (en) * 2010-01-15 2015-06-09 Apple Inc. Specialized network fileserver
US8931103B2 (en) * 2011-09-08 2015-01-06 International Business Machines Corporation Generating security permissions
CN103106042B (zh) * 2011-11-14 2016-07-06 联想(北京)有限公司 数据存取方法和电子设备
TWI461958B (zh) 2012-06-22 2014-11-21 Wistron Corp 應用程式的權限控管方法、電子裝置及電腦可讀取媒體
US10073987B2 (en) * 2013-04-02 2018-09-11 Western Digital Technologies, Inc. Methods and systems for privileged execution support for file system commands on a storage device
CN103324887B (zh) * 2013-07-05 2016-12-28 百度在线网络技术(北京)有限公司 移动终端的安全防御装置、方法和移动终端
US10275470B2 (en) * 2013-08-15 2019-04-30 Amazon Technologies, Inc. Network-backed file system
US9787685B2 (en) * 2014-06-24 2017-10-10 Xiaomi Inc. Methods, devices and systems for managing authority
US9672026B2 (en) 2014-07-21 2017-06-06 Xiaomi Inc. Light app offline updating method, device and terminal
CN104156233B (zh) * 2014-07-21 2016-05-18 小米科技有限责任公司 轻应用离线更新方法、装置及终端
US10366016B2 (en) 2016-07-29 2019-07-30 Hewlett-Packard Development Company, L.P. Access to persistent memory regions of computing devices
US10552600B2 (en) * 2016-11-02 2020-02-04 Lenovo Enterprise Solutions (Singapore) Pte. Ltd. Securing a media storage device using application authority assignment
TWI673667B (zh) * 2017-01-25 2019-10-01 楊建綱 內建智慧安全行動裝置
WO2018147827A1 (en) * 2017-02-07 2018-08-16 Hewlett-Packard Development Company, L.P. Determining cash drawer access
EP3407559A1 (en) * 2017-05-26 2018-11-28 Authentic Vision GmbH System and method to manage privileges based on the authentication of an uncloneable security device

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5146575A (en) * 1986-11-05 1992-09-08 International Business Machines Corp. Implementing privilege on microprocessor systems for use in software asset protection
CA1323448C (en) * 1989-02-24 1993-10-19 Terrence C. Miller Method and apparatus for translucent file system
US5136712A (en) * 1989-06-29 1992-08-04 Digital Equipment Corporation Temporary object handling system and method in an object based computer operating system
US5128995A (en) * 1990-07-23 1992-07-07 International Business Machines Corp. Apparatus and method for loading a system reference diskette image from a system partition in a personal computer system
FR2683357A1 (fr) * 1991-10-30 1993-05-07 Philips Composants Microcircuit pour carte a puce a memoire programmable protegee.
US5412717A (en) * 1992-05-15 1995-05-02 Fischer; Addison M. Computer system security method and apparatus having program authorization information data structures
US5497494A (en) * 1993-07-23 1996-03-05 International Business Machines Corporation Method for saving and restoring the state of a CPU executing code in protected mode
US5551051A (en) * 1994-09-20 1996-08-27 Motorola, Inc. Isolated multiprocessing system having tracking circuit for verifyng only that the processor is executing set of entry instructions upon initiation of the system controller program
JPH08272625A (ja) * 1995-03-29 1996-10-18 Toshiba Corp マルチプログラム実行制御装置及び方法
US5761669A (en) * 1995-06-06 1998-06-02 Microsoft Corporation Controlling access to objects on multiple operating systems
JP2000514584A (ja) * 1996-10-25 2000-10-31 シュルンベルジェ システーム 高級プログラミング言語を用いたマイクロコントローラ
JP2000076135A (ja) * 1998-08-27 2000-03-14 Nippon Telegr & Teleph Corp <Ntt> プロセッサのメモリ保護方法及びプロセッサのメモリを保護されたicカード
US6578078B1 (en) * 1999-04-02 2003-06-10 Microsoft Corporation Method for preserving referential integrity within web sites
US6757698B2 (en) * 1999-04-14 2004-06-29 Iomega Corporation Method and apparatus for automatically synchronizing data from a host computer to two or more backup data storage locations
US6347331B1 (en) * 1999-04-26 2002-02-12 International Business Machines Corporation Method and apparatus to update a windows registry from a hetrogeneous server
US6343324B1 (en) * 1999-09-13 2002-01-29 International Business Machines Corporation Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices
US6430561B1 (en) * 1999-10-29 2002-08-06 International Business Machines Corporation Security policy for protection of files on a storage device
US6823458B1 (en) * 1999-11-18 2004-11-23 International Business Machines Corporation Apparatus and method for securing resources shared by multiple operating systems
US7035825B1 (en) * 2000-01-04 2006-04-25 E.Piphany, Inc. Managing relationships of parties interacting on a network
US7035850B2 (en) * 2000-03-22 2006-04-25 Hitachi, Ltd. Access control system
US7146635B2 (en) * 2000-12-27 2006-12-05 International Business Machines Corporation Apparatus and method for using a directory service for authentication and authorization to access resources outside of the directory service
US20020169854A1 (en) * 2001-01-22 2002-11-14 Tarnoff Harry L. Systems and methods for managing and promoting network content
US20020152262A1 (en) * 2001-04-17 2002-10-17 Jed Arkin Method and system for preventing the infringement of intellectual property rights
US7448077B2 (en) * 2002-05-23 2008-11-04 International Business Machines Corporation File level security for a metadata controller in a storage area network
JP2004029991A (ja) * 2002-06-24 2004-01-29 Fujitsu Ltd ファイル処理プログラムおよびファイル処理装置
JP4007873B2 (ja) * 2002-07-09 2007-11-14 富士通株式会社 データ保護プログラムおよびデータ保護方法
US6931530B2 (en) * 2002-07-22 2005-08-16 Vormetric, Inc. Secure network file access controller implementing access control and auditing
US7143288B2 (en) * 2002-10-16 2006-11-28 Vormetric, Inc. Secure file system server architecture and methods
US20040230753A1 (en) * 2003-05-16 2004-11-18 International Business Machines Corporation Methods and apparatus for providing service differentiation in a shared storage environment
US20050197859A1 (en) * 2004-01-16 2005-09-08 Wilson James C. Portable electronic data storage and retreival system for group data

Also Published As

Publication number Publication date
CN1564992A (zh) 2005-01-12
HK1070442A1 (en) 2005-06-17
NZ531200A (en) 2006-03-31
WO2003017682A3 (en) 2003-11-27
JP2005500608A (ja) 2005-01-06
CN1307581C (zh) 2007-03-28
KR100538659B1 (ko) 2005-12-26
BR0211917A (pt) 2004-09-28
TWI236298B (en) 2005-07-11
EP1417602A2 (en) 2004-05-12
MXPA04002494A (es) 2004-07-30
IL160395A0 (en) 2004-07-25
JP2010182319A (ja) 2010-08-19
CA2457617A1 (en) 2003-02-27
US7921287B2 (en) 2011-04-05
RU2004107492A (ru) 2005-09-27
RU2307388C2 (ru) 2007-09-27
WO2003017682A2 (en) 2003-02-27
US20030061504A1 (en) 2003-03-27
PE20030375A1 (es) 2003-04-12
EP1417602A4 (en) 2007-08-22
KR20040015702A (ko) 2004-02-19

Similar Documents

Publication Publication Date Title
AR036214A1 (es) Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capa
ES2548149T3 (es) Sistema de iluminación y procedimiento con SNR mejorada
CN104798053B (zh) 安全区域内的存储器管理
BRPI0406386A (pt) Gerenciamento de contatos
ES2125100T3 (es) Instalacion de proceso de datos multi-usuarios con proteccion de memoria.
TW200720924A (en) Interfacing systems operating through a logical address space and on a direct data file basis
DE60336212D1 (de) Speichersystem mit einer kürzeren burstlänge als der prefetchlänge
BR0306594A (pt) Acesso de dados mestre
BRPI0703677A (pt) método para atribuir dados de multimìdia a dispositivos de armazenamento distribuìdo
ATE453150T1 (de) Techniken zur betreibung von nichtflüchtigen speichersystemen mit datensektoren, die anderen grössen als die grösse von seiten und/oder blöcken des speichers haben
CO5630025A1 (es) Interface de programacion para una plataforma de computo
BR0303350A (pt) Dispositivo e método para gravar informação em uma trilha de uma portadora de gravação, e, portadora de gravação
DE602004003062D1 (de) Multibit-speicher mit dynamischer referenz-spannungs erzeugung
WO2007023213A3 (fr) Procede de configuration d&#39;un espace memoire divise en zones memoire
TW200700992A (en) System for creating control structure for versatile content control
ATE507528T1 (de) Erfassung von datenmaskenabbildungsinformation
DE50113843D1 (de) Integrierter Halbleiterspeicher mit redundanter Einheit von Speicherzellen
DE60227893D1 (de) Halbleiterspeicher mit reduzierter Schwankung von Schreibgeschwindigkeit
EP2637124A3 (en) Method for implementing security of non-volatile memory
DE502005007010D1 (de) Durch authentisierung gesicherter zugriff auf einen datenträger mit massenspeicher und chip
BR112015029854A2 (pt) mapeamento de endereço de ecc incorporado
ATE313820T1 (de) Bereitstellung von informationen in einem automatisierungssystem
TW200943058A (en) Method of wear leveling for non-volatile memory
DE602005017360D1 (de) Fifo-speicherbaustein mit nichtflüchtiger speicherstufe
BR9902375A (pt) Sistema de gerenciamento de base de dados e método para armazenagem de atributos persistentes e nã0-persistentes

Legal Events

Date Code Title Description
FG Grant, registration