摘要:
Systems, methods, and software for reducing system management interrupt (SMI) latency while operating in system management mode. The present invention implements a technique for exiting system management mode while waiting for polled hardware events, handling any pending lower-priority interrupts and then resuming polling. The present invention does this by multi-threading SMI source handlers, using an idle thread, and using protocols for software-generated system management interrupts that insure that lower priority interrupts are serviced.
摘要:
A utility with a windows interface with which a single original-equipment-manufacturer (OEM) programmer can generate firmware compatible with the Advanced Configuration and Power Interface (ACPI) specification. The firmware includes an ACPI name space, i.e., a hierarchical tree structure in operating system-controlled memory containing data objects, control method objects, and bus/device package objects. The hierarchical name space is constructed using a "click and drag" methodology, and is represented in the windows interface as a iconographic tree structure. From the root of the tree structure are branches for general purpose events, processor power control, sleep states, the system bus, and temperature controls. The system bus has branches for devices located thereon, and the devices have branches for folders containing current resource settings, hardware identification, possible resource settings, and set resource settings information. The utility prompts the OEM programmer during the creation of the name space for information required to complete the specification of the details of the system. The utility provides a large number of default components, from the level of the entirety of the hierarchical tree structure to the level of the individual devices. Using a recursive process, the constructed hierarchical tree structure is mapped to ASL source code with a structure roughly mirroring that of the tree structure. In general, the recursive process creates a name statement, opening brace, body and closing brace for each item, and child items within the scope of a parent item fall within the body of the parent item. For some items (such as fields, methods, packages and resources) it is necessary to override the generation of braces and/or the body.
摘要:
Techniques for determining whether firmware should trust an application sufficiently so as to provide a service to the application. Firmware, executing on a device, receives an indication that an application, also executing on the device, is requesting a service provided by the firmware. The firmware obtains (a) an operating system signature associated with the application and (b) a firmware signature associated with the application. The operating system signature is a signature that is used by the operating system, executing on the device, to authenticate the application, while the firmware signature is a signature that is used by the firmware to authenticate the application. If the firmware determines that the operating system signature matches the firmware signature, then the firmware storing trust data that permits the application to access the service provided by the firmware. The firmware need not calculate a signature based on the in-memory image of the application.
摘要:
The present invention provides, inter alia, compositions and methods for treating various diseases and disorders in a mammal by administering to a mammal in need an effective amount of a composition comprising a non-DNA small molecule that binds WRN, such as members of the spirooxindole (SPOX) class.
摘要:
Systems, methods and software that use a programmable lock bit that disables read access to a firmware ROM until the CPU is reset or enters into a secure CPU mode. The present invention provides for secure system firmware by preventing access to and reading of the contents of the firmware ROM.
摘要:
Data representing bitmapped graphics and/or text characters is stored in a video buffer or memory of a computer. A window is designated that includes contiguous rows and columns of data to be scrolled. The data in the window is vertically scrolled by columns. One column can be scrolled at a time, or two or more adjacent or alternating columns can be scrolled at a time. The column scrolling method is faster than scrolling by rows when the number of rows in the window is small and/or the number of rows to scroll is high. Program instructions for implementing the scrolling are preferably stored in a Basic Input-Output System (BIOS) Read-Only Memory (ROM) chip to provide a built-in, backward compatible low resolution display capability, e.g. a Color Graphics Adapter (CGA) text display, for a newer computer or other data processing device.
摘要:
A mechanism for allowing a user to prove their identity on touch-based devices employing the use of a touch surface in firmware-controlled environments is discussed. The user may prove his or her identity by entering a series of strokes on the touch-based device to form a word or image. Characteristics of the entered strokes such as stroke order and stroke direction are compared to stored stroke characteristics that were gathered from a drawing of the same word or image during a user enrollment process. If the stroke characteristics comparison is acceptable, the user identity is verified.
摘要:
Techniques for firmware providing a simulated system management mode (SMM) while being executed by a non-x86 platform, such as an ARM platform. In response to receiving a service call from an OS interface driver, the firmware may determine a requested service identified by the service call. Thereafter, the firmware may identify an appropriate service handler to perform the requested service. After the appropriate service handler performs the requested service, the appropriate service handler notifies the OS interface driver. Since the SMM is emulated by the firmware, the firmware may execute on an x86 platform or a non-x86 platform, such as an ARM platform.
摘要:
Techniques for determining whether firmware should trust an application sufficiently so as to provide a service to the application. Firmware, executing on a device, receives an indication that an application, also executing on the device, is requesting a service provided by the firmware. The firmware obtains (a) an operating system signature associated with the application and (b) a firmware signature associated with the application. The operating system signature is a signature that is used by the operating system, executing on the device, to authenticate the application, while the firmware signature is a signature that is used by the firmware to authenticate the application. If the firmware determines that the operating system signature matches the firmware signature, then the firmware storing trust data that permits the application to access the service provided by the firmware. The firmware need not calculate a signature based on the in-memory image of the application.
摘要:
A Basic Input-Output System (BIOS) Read-Only Memory (ROM) for a computer system includes a color expansion table, and a storage for storing a computer program for generating an output character represented by bitmapped output scan lines from a corresponding input character represented by bitmapped input scan lines which have a smaller number of bits than the output scan lines. The input scan lines are each preferably one byte long, with one pixel being represented by one bit. The output scan lines are each preferably one word long, with each pixel being represented by two bits to provide four selectable colors or shades of grey. The computer program includes instructions for accessing the expansion table with the input scan lines to obtain corresponding output scan lines. The expansion table includes entries which are addressable by a nibble of an input scan line and contain a corresponding byte of an output scan line, and separate sections for the four colors. A character can be generated once, or a selected number of times, at high speed.