Power Management On Portable Devices
    11.
    发明申请
    Power Management On Portable Devices 有权
    便携式设备上的电源管理

    公开(公告)号:US20120176946A1

    公开(公告)日:2012-07-12

    申请号:US12987846

    申请日:2011-01-10

    Abstract: A computing apparatus receives data that corresponds to a wireless network connection established with an access point. The computing apparatus determines whether the access point corresponds to a predetermined access point type, and also determines that a device is to transition to a reduced power state. When the access point corresponds to the predetermined access point type and the determines that the device is to transition to the reduced power state, the computing apparatus transitions the device from a first power state to a reduced power state, and maintains the wireless network connection by using at least a subset of wireless functionality operatively coupled to the device.

    Abstract translation: 计算装置接收对应于与接入点建立的无线网络连接的数据。 计算装置确定接入点是否对应于预定的接入点类型,并且还确定设备要转换到降低功率状态。 当接入点对应于预定接入点类型并且确定设备要转换到降低功率状态时,计算设备将设备从第一功率状态转换到降低功率状态,并且通过以下方式维持无线网络连接: 使用可操作地耦合到所述设备的无线功能的至少一个子集。

    Method for controlling file access on computer systems
    12.
    发明授权
    Method for controlling file access on computer systems 有权
    控制计算机系统文件访问的方法

    公开(公告)号:US08086873B2

    公开(公告)日:2011-12-27

    申请号:US11446737

    申请日:2006-06-05

    CPC classification number: G06F12/1475 G06F21/78

    Abstract: A method for controlling file access on computer systems is disclosed. Initially, a virtual machine manager (VMM) is provided in a computer system. In response to a write request, the VMM determines whether or not a location field is valid. If the location field is not valid, then the VMM writes the write request information to a storage device; but if the location field is valid, then the VMM encrypts the write request information before writing the write request information to the storage device. In response to a read request, the VMM again determines whether or not a location field is valid. If the location field is not valid, then the VMM sends the read request information to a read requester; but, if the location field is valid, then the VMM decrypts the read request information before sending the read request information to the read requester.

    Abstract translation: 公开了一种用于控制计算机系统上的文件访问的方法。 最初,在计算机系统中提供虚拟机管理器(VMM)。 响应于写入请求,VMM确定位置字段是否有效。 如果位置字段无效,则VMM将写请求信息写入存储设备; 但是如果位置字段有效,则VMM在将写入请求信息写入存储设备之前对写入请求信息进行加密。 响应于读取请求,VMM再次确定位置字段是否有效。 如果位置字段无效,则VMM将读取请求信息发送给读取请求者; 但是,如果位置字段有效,则VMM在将读取请求信息发送给读取请求者之前解密读取请求信息。

    SYSTEMS AND METHODS FOR APPLICATION SOUND MANAGEMENT
    14.
    发明申请
    SYSTEMS AND METHODS FOR APPLICATION SOUND MANAGEMENT 有权
    应用声音管理系统与方法

    公开(公告)号:US20110196520A1

    公开(公告)日:2011-08-11

    申请号:US12703277

    申请日:2010-02-10

    CPC classification number: G06F3/165

    Abstract: Embodiments of the invention provide systems, methods, apparatuses and program products configured to intelligently manage sound options for applications of a computer system based on display device characteristics. Various embodiments of the invention are particularly well suited for optimizing the sound options of two or more applications running on two or more display screens of the computer system simultaneously.

    Abstract translation: 本发明的实施例提供了被配置为智能地管理基于显示装置特性的计算机系统的应用的声音选项的系统,方法,装置和程序产品。 本发明的各种实施例特别适用于同时优化在计算机系统的两个或更多个显示屏上运行的两个或多个应用的​​声音选项。

    SECURITY TO EXTEND TRUST
    15.
    发明申请
    SECURITY TO EXTEND TRUST 有权
    安全延长信任

    公开(公告)号:US20110154010A1

    公开(公告)日:2011-06-23

    申请号:US12641029

    申请日:2009-12-17

    Abstract: An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash in a secure register; load an operating system; validate a certificate associated with the core root of trust measurement code and validate a certificate associated with the system management code; based on the validated certificates, provide an expected hash associated with the core root of trust measurement code and the system management code; decide if the expected hash matches the hash stored in the register; and, if the expected hash matches the hash stored in the register, commence a dynamic root of trust measurement session. Various other apparatuses, systems, methods, etc., are also disclosed.

    Abstract translation: 示例性装置包括一个或多个处理器; 记忆; 配置为对与信任测度代码的核心根和系统管理代码相关联的值进行散列的电路; 将哈希存储在安全寄存器中; 加载操作系统; 验证与信任测度代码的核心根相关联的证书,并验证与系统管理代码相关联的证书; 基于验证的证书,提供与信任测度代码的核心根和系统管理代码相关联的预期散列; 确定预期哈希是否与存储在寄存器中的哈希匹配; 并且如果期望的哈希与存储在寄存器中的哈希匹配,则启动信任测量会话的动态根。 还公开了各种其它装置,系统,方法等。

    Computer implemented method, system and computer program product for controlling software entitlement
    16.
    发明授权
    Computer implemented method, system and computer program product for controlling software entitlement 有权
    计算机实现方法,系统和计算机程序产品,用于控制软件授权

    公开(公告)号:US07934214B2

    公开(公告)日:2011-04-26

    申请号:US11394792

    申请日:2006-03-31

    CPC classification number: G06F8/61

    Abstract: Computer implemented method, system and computer program product for controlling software entitlement. A computer implemented method for controlling software entitlement includes receiving a request to install a software item on a designated machine. A determination is made if the designated machine is of a machine type authorized for installation of the software item. If the designated machine is of a machine type authorized for installation of the software item, a determination is made, using stored configuration data, if at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied using stored configuration data. If the at least one additional criterion specified for entitlement to install the software item on the designated machine is satisfied, installation of the software item on the designated machine is enabled in accordance with the at least one additional criterion.

    Abstract translation: 计算机实现方法,系统和计算机程序产品,用于控制软件授权。 用于控制软件授权的计算机实现的方法包括在指定的机器上接收安装软件项目的请求。 如果指定的机器是被授权安装软件项目的机器类型,则确定。 如果指定的机器是被授权安装软件项目的机器类型,则使用存储的配置数据确定如果使用存储的配置满足在指定机器上安装软件项目的权利所指定的至少一个附加标准 数据。 如果满足指定用于在指定机器上安装软件项目的权利的至少一个附加标准,则根据至少一个附加标准启用软件项目在指定机器上的安装。

    Method and apparatus for preventing unauthorized modifications to rental computer systems
    18.
    发明授权
    Method and apparatus for preventing unauthorized modifications to rental computer systems 有权
    防止对租赁计算机系统进行未经授权的修改的方法和装置

    公开(公告)号:US07818553B2

    公开(公告)日:2010-10-19

    申请号:US11535538

    申请日:2006-09-27

    Abstract: A method for preventing unauthorized modifications to a rental computer system is disclosed. During boot up of the rental computer system, a determination is made whether or not a time-day card is bound to the rental computer system. If the time-day card is bound to the rental computer system, another determination is made whether or not a time/date value on the time-day card is less than a secure time/date value stored in a secure storage location during the most recent power down. If the time/date value on the time-day card is not less than the secure time/date value, yet another determination is made whether or not the secure time/date value is less than an end time/date rental value. If the secure time/date value is less than the end time/date rental value, the rental computer system continues to boot.

    Abstract translation: 公开了一种防止对租赁计算机系统的未经授权的修改的方法。 在租赁计算机系统的引导期间,确定时间日卡是否绑定到租赁计算机系统。 如果时间日卡被绑定到租赁计算机系统,则另外确定时间日卡上的时间/日期值是否小于最多存储在安全存储位置中的安全时间/日期值 最近掉电。 如果时间日卡上的时间/日期值不小于安全时间/日期值,则另外确定安全时间/日期值是否小于结束时间/日期租赁值。 如果安全时间/日期值小于结束时间/日期租金值,则租用计算机系统将继续启动。

    Centralized software maintenance of blade computer system
    19.
    发明授权
    Centralized software maintenance of blade computer system 有权
    刀片式计算机系统集中软件维护

    公开(公告)号:US07702777B2

    公开(公告)日:2010-04-20

    申请号:US11024122

    申请日:2004-12-28

    CPC classification number: G06F8/60

    Abstract: A method and system are disclosed in which a management module (MM) designates an idle blade in a client blade farm to be an “administrative blade” that has administrator access to the virtual images of all users. The MM identifies when a particular user image is, or is not, in use and conveys this information to the administrative blade. The administrative blade performs virus scans, backups, defrags, patch installs, software upgrades, and other such maintenance functions on user images when they are inactive, thereby eliminating the performance impact to active users.

    Abstract translation: 公开了一种方法和系统,其中管理模块(MM)将客户机刀片服务器场中的空闲刀片指定为具有对所有用户的虚拟映像的管理员访问权限的“管理刀片”。 MM识别特定用户图像何时或未使用,并将该信息传送给管理刀片。 管理刀片在不活动时对用户图像执行病毒扫描,备份,defrags,修补程序安装,软件升级和其他此类维护功能,从而消除对活动用户的性能影响。

    APPARATUS, SYSTEM AND METHOD FOR STORAGE CACHE DEDUPLICATION
    20.
    发明申请
    APPARATUS, SYSTEM AND METHOD FOR STORAGE CACHE DEDUPLICATION 有权
    用于存储高速缓存的装置,系统和方法

    公开(公告)号:US20100070715A1

    公开(公告)日:2010-03-18

    申请号:US12233264

    申请日:2008-09-18

    CPC classification number: G06F12/0873 G06F12/0868 G06F2212/263

    Abstract: An apparatus, system, and method are disclosed for deduplicating storage cache data. A storage cache partition table has at least one entry associating a specified storage address range with one or more specified storage partitions. A deduplication module creates an entry in the storage cache partition table wherein the specified storage partitions contain identical data to one another within the specified storage address range thus requiring only one copy of the identical data to be cached in a storage cache. A read module accepts a storage address within a storage partition of a storage subsystem, to locate an entry wherein the specified storage address range contains the storage address, and to determine whether the storage partition is among the one or more specified storage partitions if such an entry is found.

    Abstract translation: 公开了用于重复数据删除存储高速缓存数据的装置,系统和方法。 存储高速缓存分区表具有至少一个将指定的存储地址范围与一个或多个指定的存储分区相关联的条目。 重复数据消除模块在存储高速缓存分区表中创建条目,其中指定的存储分区在指定的存储地址范围内彼此包含相同的数据,因此仅需要将相同数据的一个副本缓存在存储高速缓存中。 读取模块接受存储子系统的存储分区内的存储地址,以定位其中指定的存储地址范围包含存储地址的条目,并且如果这样的一个或多个存储分区 找到条目。

Patent Agency Ranking