1
Thomas O Holtey: Secure memory card with programmed controlled security access control. Bull NH Information Systems, Faith F Driscoll, John S Solakian, August 15, 1995: US05442704 (133 worldwide citation)

A secure memory card includes a microprocessor on a single semiconductor chip which interconnects through an internal bus to a number of non-volatile addressable memory chips. The microprocessor includes an addressable non-volatile memory for storing information including a number of key values and ...


2
James B Geyer, Victor M Morganti, Patrick E Prange: Single instruction updating of processing time field using software invisible working registers. Bull NH Information Systems, William W Holloway, Faith F Driscoll, John S Solakian, June 26, 1990: US04937780 (15 worldwide citation)

In a data processing system, a measurement of the cumulative time used in the performance of an intermittent activity can be required. To determine this cumulative time, a memory location is designated during initialization that is to contain the value of the system clock determined at each initiati ...


3
Thomas F Joyce, Richard P Kelly, Jian Kuo Shen: Method and apparatus for backing out of a software instruction after execution has begun. Bull NH Information Systems, George Grayson, John S Solakian, February 13, 1990: US04901222 (2 worldwide citation)

In a data processing system using a virtual memory addressing scheme, certain software instructions call for the virtual address to be stored in a base register. The virtual address stored in the base register is incremented or decremented during the read out cycle of the previous operand to address ...


4
Charles P Ryan, William A Shelly, Stephen A Schuerich: High integrity cache directory. Bull NH Information Systems, John S Solakian Esq, Law Office M S B55, January 23, 2003: US20030018936-A1

Cache memory, and thus computer system, reliability is increased by duplicating cache tag entries. Each cache tag has a primary entry and a duplicate entry. Then, when cache tags are associatively searched, both the primary and the duplicate entry are compared to the search value. At the same time, ...