System and method for maintaining persistent state data
    21.
    发明授权
    System and method for maintaining persistent state data 有权
    用于维护持久状态数据的系统和方法

    公开(公告)号:US07392429B2

    公开(公告)日:2008-06-24

    申请号:US11020329

    申请日:2004-12-22

    IPC分类号: G06F11/00

    CPC分类号: G06F1/30 G06F11/1441

    摘要: A system and method for maintaining persistent data during an unexpected power loss uses a memory controller and a supplemental power source. An entity running on the computer, for example, an application program, a utility, the operating system or other entity, may identify data for preservation using an application program interface. The application program interface may be provided by the memory controller. A sensor determines when an unexpected power loss has occurred and signals the memory controller. Using power from the supplemental power source, i.e. a battery or capacitor, the memory controller copies the identified data to a non-volatile memory. The memory controller may set a flag to indicate that preserved data is available for later recovery.

    摘要翻译: 在意外的功率损耗期间维护持久数据的系统和方法使用存储器控制器和补充电源。 在计算机上运行的实体,例如应用程序,实用程序,操作系统或其他实体,可以使用应用程序接口识别用于保存的数据。 应用程序接口可以由存储器控制器提供。 传感器确定何时发生意外的功率损耗并向存储器控制器发出信号。 使用来自补充电源(即,电池或电容器)的电力,存储器控制器将识别的数据复制到非易失性存储器。 存储器控制器可以设置标志以指示保留的数据可用于稍后的恢复。

    Enhanced packaging for PC security
    22.
    发明授权
    Enhanced packaging for PC security 有权
    增强了PC安全包装

    公开(公告)号:US07979721B2

    公开(公告)日:2011-07-12

    申请号:US11612436

    申请日:2006-12-18

    IPC分类号: G06F11/30 G06F17/00 G06F1/00

    摘要: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.

    摘要翻译: 使用计费器的计算机或使用本地安全的其他电子设备可以使用安全模块或其他电路来监视和执行使用策略。 为了防止对安全模块或安全模块附近的电路板的物理攻击,可以在安全模块上安装第二电路,以帮助防止访问安全模块。 两个电路可以安装在插入器上,并且插入器安装到电路板,产生包括第一电路,插入器,安全模块和主PC板的堆叠。 当PC板在安全模块下面包含密集的信号迹线时,将在安全模块周围创建三维信封。 当第一个电路是诸如北桥的高价值电路时,攻击安全模块的风险/报酬大大增加,并且可能阻止除了最确定的黑客之外的所有电路。

    System and method for trustworthy metering and deactivation
    23.
    发明授权
    System and method for trustworthy metering and deactivation 有权
    用于可靠计量和停用的系统和方法

    公开(公告)号:US07406446B2

    公开(公告)日:2008-07-29

    申请号:US11074500

    申请日:2005-03-08

    摘要: A computer is adapted for use in different operating modes by configuring an output controller, such as a graphics processing unit, to screen output signals prior to presenting them to the output device. A secure environment in the output controller verifies a digital signature or a hash of the output signal to determine whether the output signal is compatible with the current mode of operation. Thus only authorized output signals are presented when the computer is operating in a limited function mode, such as when metered usage time is expired. The apparatus and method also disclose similar output signal screening for determining whether the computer should be returned from a standby, or no-metering, mode to an active, or metered mode.

    摘要翻译: 计算机适于在不同的操作模式中使用,通过配置诸如图形处理单元之类的输出控制器,以在将输出信号呈现给输出设备之前进行屏幕输出。 输出控制器中的安全环境验证输出信号的数字签名或散列,以确定输出信号是否与当前操作模式兼容。 因此,当计算机以有限的功能模式操作时,例如当计量使用时间到期时,仅呈现授权的输出信号。 该装置和方法还公开了类似的输出信号筛选,用于确定计算机是否应该从备用或无计量模式返回到活动或计量模式。

    Computer compliance enforcement
    24.
    发明授权
    Computer compliance enforcement 有权
    计算机合规执行

    公开(公告)号:US07844808B2

    公开(公告)日:2010-11-30

    申请号:US11612435

    申请日:2006-12-18

    IPC分类号: H04K1/00 G06F21/22

    摘要: A security module for a pay-per-use computer supplies an appropriate BIOS for a given mode of operation. A power manager in the security module powers only essential circuits until the BIOS is operational to help prevent substitution of a non-authorized BIOS. The security module also includes a capability to monitor and restrict data lines on a bus between a main computer processor and computer system memory. When the computer is operating in a restricted use mode, data lines may be restricted to allow only minimal access to the computer system memory. Bus transactions may be monitored to ensure that only valid transactions are occurring and are within the designated memory space.

    摘要翻译: 用于付费电脑的计算机的安全模块为给定的操作模式提供适当的BIOS。 安全模块中的电源管理器只能运行必要的电路,直到BIOS运行,以防止替换未经授权的BIOS。 安全模块还包括监视和限制主计算机处理器和计算机系统存储器之间总线上的数据线的功能。 当计算机在受限使用模式下操作时,数据线可能被限制为仅允许对计算机系统存储器的最小访问。 可以监视总线事务,以确保只有有效的事务正在发生并且在指定的存储空间内。

    Enhanced Packaging for PC Security
    25.
    发明申请
    Enhanced Packaging for PC Security 有权
    PC安全增强包装

    公开(公告)号:US20100037325A1

    公开(公告)日:2010-02-11

    申请号:US11612436

    申请日:2006-12-18

    IPC分类号: G06F21/02

    摘要: A pay-per-use computer, or other electronic device that uses local security, may use a security module or other circuit for monitoring and enforcement of a usage policy. To help prevent physical attacks on the security module, or the circuit board near the security module, a second circuit may be mounted over the security module to help prevent access to the security module. Both circuits may be mounted on a interposer and the interposer mounted to the circuit board, creating a stack including the first circuit, the interposer, the security module, and a main PC board. When the PC board includes dense signal traces under the security module a three dimensional envelope is created around the security module. When the first circuit is a high value circuit, such as a Northbridge, the risk/reward of attacking the security module is increased substantially and may deter all but the most determined hackers.

    摘要翻译: 使用计费器的计算机或使用本地安全的其他电子设备可以使用安全模块或其他电路来监视和执行使用策略。 为了防止对安全模块或安全模块附近的电路板的物理攻击,可以在安全模块上安装第二电路,以帮助防止访问安全模块。 两个电路可以安装在插入器上,并且插入器安装到电路板,产生包括第一电路,插入器,安全模块和主PC板的堆叠。 当PC板在安全模块下面包含密集的信号迹线时,将在安全模块周围创建三维信封。 当第一个电路是诸如北桥的高价值电路时,攻击安全模块的风险/报酬大大增加,并且可能阻止除了最确定的黑客之外的所有电路。

    Computer Compliance Enforcement
    26.
    发明申请
    Computer Compliance Enforcement 有权
    计算机合规执法

    公开(公告)号:US20080148036A1

    公开(公告)日:2008-06-19

    申请号:US11612435

    申请日:2006-12-18

    摘要: A security module for a pay-per-use computer supplies an appropriate BIOS for a given mode of operation. A power manager in the security module powers only essential circuits until the BIOS is operational to help prevent substitution of a non-authorized BIOS. The security module also includes a capability to monitor and restrict data lines on a bus between a main computer processor and computer system memory. When the computer is operating in a restricted use mode, data lines may be restricted to allow only minimal access to the computer system memory. Bus transactions may be monitored to ensure that only valid transactions are occurring and are within the designated memory space.

    摘要翻译: 用于付费电脑的计算机的安全模块为给定的操作模式提供适当的BIOS。 安全模块中的电源管理器只能运行必要的电路,直到BIOS运行,以防止替换未经授权的BIOS。 安全模块还包括监视和限制主计算机处理器和计算机系统存储器之间总线上的数据线的功能。 当计算机在受限使用模式下操作时,数据线可能被限制为仅允许对计算机系统存储器的最小访问。 可以监视总线事务,以确保只有有效的事务正在发生并且在指定的存储空间内。

    SYSTEM AND METHOD FOR BINDING A SUBSCRIPTION-BASED COMPUTING SYSTEM TO AN INTERNET SERVICE
    27.
    发明申请
    SYSTEM AND METHOD FOR BINDING A SUBSCRIPTION-BASED COMPUTING SYSTEM TO AN INTERNET SERVICE 失效
    将基于订阅的计算系统绑定到互联网服务的系统和方法

    公开(公告)号:US20110271335A1

    公开(公告)日:2011-11-03

    申请号:US13159886

    申请日:2011-06-14

    IPC分类号: G06F21/20

    CPC分类号: H04L63/12 H04L63/0428

    摘要: A system for binding a subscription-based computer to an internet service provider (ISP) may include a binding module and a security module residing on the computer. The binding module may identify and authenticate configuration data from peripheral devices that attempt to connect to the computer, encrypt any requests for data from the computer to the ISP, and decrypt responses from the ISP. If the binding module is able to authenticate the configuration data and the response to the request for data from the ISP, then the security module may allow the communication between the computer and the ISP. However, if either the configuration cycle or the response cannot be properly verified, then the security module may degrade operation of the computer.

    摘要翻译: 用于将基于订阅的计算机绑定到因特网服务提供商(ISP)的系统可以包括驻留在计算机上的绑定模块和安全模块。 绑定模块可以识别并验证来自外部设备的配置数据,这些配置数据尝试连接到计算机,将来自计算机的任何数据请求加密到ISP,并解密来自ISP的响应。 如果绑定模块能够验证配置数据以及对来自ISP的数据请求的响应,则安全模块可以允许计算机和ISP之间的通信。 但是,如果配置周期或响应无法正确验证,则安全模块可能会降低计算机的运行。

    SMART NOTEBOOK
    28.
    发明申请
    SMART NOTEBOOK 有权
    智能笔记本

    公开(公告)号:US20100325559A1

    公开(公告)日:2010-12-23

    申请号:US12487620

    申请日:2009-06-18

    IPC分类号: G06F3/01

    摘要: Techniques are disclosed herein for allowing sharing of notes and ideas between electronic devices. The presence of a number of electronic devices is determined. A determination is made that the electronic devices are to be part of a shared workspace. A shared workspace is generated for the electronic devices. The shared workspace is displayed on a display screen of at least one of the electronic devices. The shared workspace that is displayed may be based on the capabilities of the electronic device. The shared workspace that is displayed may reflect the location of the electronic devices.

    摘要翻译: 本文公开了允许在电子设备之间共享笔记和想法的技术。 确定了许多电子设备的存在。 确定电子设备将成为共享工作空间的一部分。 为电子设备生成共享工作区。 共享工作区显示在至少一个电子设备的显示屏幕上。 显示的共享工作区可以基于电子设备的功能。 显示的共享工作区可能反映电子设备的位置。

    Controlling an auxiliary display user interface based on usage context
    29.
    发明授权
    Controlling an auxiliary display user interface based on usage context 有权
    根据使用情况控制辅助显示用户界面

    公开(公告)号:US07523226B2

    公开(公告)日:2009-04-21

    申请号:US11371660

    申请日:2006-03-09

    IPC分类号: G06F3/00

    CPC分类号: G08C17/02 G08C2201/33

    摘要: An auxiliary computing device normally used for remotely controlling a primary device may change its functionality and extend its usefulness based on a usage context. An auxiliary device may change its usage context by connecting differently to a primary device depending on any number of parameters including distance from the device, battery life, connection method, and proximity to other devices. The device may change its usage context by interfacing with a primary device service that communicates with various applications to feed the auxiliary device different information in different usage contexts. Further, the device may control different functions of the primary device based on the usage context.

    摘要翻译: 通常用于远程控制主设备的辅助计算设备可以改变其功能并且基于使用上下文来扩展其有用性。 辅助设备可以根据包括与设备的距离,电池寿命,连接方法以及与其他设备的接近度的任何数量的参数而不同地连接到主设备来改变其使用上下文。 该设备可以通过与与各种应用通信的主设备服务接口来改变其使用上下文,以将辅助设备馈送到不同使用环境中的不同信息。 此外,设备可以基于使用上下文来控制主设备的不同功能。