摘要:
A system for reducing the amount of power consumed by a battery operated computer device is disclosed. A microcontroller continuously monitors the activity of at least one I/O device and sets an activity state variable (ASV) associated with the I/O device accordingly. Upon each the expiration of a preselected time period, the microcontroller examines the state of the ASV to determine whether the I/O device was active during the expired time period. If so, the I/O device is caused to operate in a full power mode; otherwise, the I/O device is caused to operate in a reduced power consumption mode. In one embodiment, the I/O device is capable of operating in more than one reduced power consumption mode, in which case, responsive to a determination that the I/O device was not active during the expired time period, the I/O device is caused to operate in the next lowest power consumption mode. In an alternative embodiment, the frequency with which timer interrupts are generated is automatically adjusted after the expiration of each time period.
摘要:
An essential utility routine accesses a protected computer system component by making a call to a coprocessor that performs a desired function to avoid security measures imposed by an operating system. Various suitable coprocessors include an additional coprocessor connected to a host processor running the operating system imposing the security measures such as a coprocessor on a add-in card to a computer system, a microcontroller, or a system management mode (SMM) program running on the host processor. The essential utility operates on a computer system having a processor operating under an operating system and a storage. The operating system includes software which limits access to the storage. The utility includes a coprocessor, a software interface and a utility routine. The coprocessor is connected to the storage and operative independent of the operating system for accessing the storage. The software interface is connected to the coprocessor and executes on the processor to control input and output operations on the processor. The utility routine executes on the processor and includes a program code operative via the software interface for activating the coprocessor to access the storage and receiving a response from the coprocessor.
摘要:
A system and method for maintaining data integrity in computer systems which have removable hard drives. The system and method of the present invention ensures that a disk drive which is reinserted into the computer system is the drive used to boot the operating system. When the computer system boots, the system reads the unique drive identification information from the hard drive and stores this identification information in memory for later use. Later, the computer system may be powered down or placed in a suspend state where the hard drive may be removed and a new drive inserted. When the computer system resumes and first requires access to the hard drive, the system and reads the drive identification information from the drive and compares the drive identification obtained from the drive with the drive identification information stored in memory at boot time. If the two sets of identification information are identical, then control is returned to the native operating system and access is allowed to the drive. In this case, since the two sets of drive identification information are identical, the same drive is comprised in or has been reinserted in the computer system, and thus operation can proceed. If the two sets of drive identification are not identical, then the system powers off the drive and reports to the user that the drive installed in the computer system is not the expected drive, i.e., is not the drive used to boot the system.
摘要:
A portable computer is provided in which the consumption of power by the I/O ports of the computer is reduced. The processor of the computer distinguishes port I/O operations that require an actual data transfer from port I/O operations that do not require an actual data transfer. The I/O ports of the computer remain off until an I/O operation involving an actual data transfer at a particular port is required. When an I/O operation which requires an actual data transfer is encountered, then the appropriate port is powered up. In this manner, power consumption by the I/O ports of the computer is significantly reduced. Advantageously, the disclosed technique for reducing power consumption by the I/O ports of the computer is operating system independent. In this manner, the power management feature functions regardless of which particular operating system or application software is installed on the computer.
摘要:
Method and apparatus for implementing a checksum technique for verifying the integrity of hard disk space reserved for use in implementing S2D capabilities is disclosed. In a preferred embodiment, a root block stored in a dedicated, fixed-size S2D partition comprises a plurality of entries each of which contains a pointer to the location of a corresponding pointer block located and a checksum for use in verifying the integrity of the pointer block. Similarly, each pointer block comprises a plurality of entries each of which contains a pointer to the location of a corresponding data block and a checksum for use in verifying the integrity of the data block. When an S2D operation is initiated, an S2D utility of the present invention locates a next available data block in the S2D partition or an extended partition, using the entries in the root block and pointer blocks, computes the checksum for the located data block, compares the computed checksum to the stored checksum for the block and, if the two checksums match writes a portion of RAM to the located block. If at any point, two checksums do not match, an error results and the S2D operation terminates. In one aspect of the invention, an MKS2D utility locates the available blocks of disk space for generating the extended partition, computes a checksum for each block and appropriately fills in the root and pointer blocks with pointers and checksums for use by the S2D utility. In another aspect of the invention, an RMS2D utility deletes the extended partition and returns the data blocks previously allocated thereto to the native OS and/or other partition(s).
摘要:
A conversion methodology utilizes increasing microprocessor performance characteristics and System Management Mode ("SMM") to provide transparent support of hardware components that include features unsupported by executing application and operating system programs. In one embodiment, a PC system includes code that supports only conventional but unavailable communication interfaces. However, the PC system is equipped with a universal serial bus ("USB") controller. Although the USB controller is unsupported by the executing code by the application and operating system programs, the conversion methodology utilizes system management mode to facilitate transparent support for the USB controller. In SMM, a CPU executes SMM code independently of the operating system(s). The conversion methodology causes entry of SMM upon any I/O operation intended for the supported but unavailable conventional communication interfaces. The SMM code provides data from the USB controller in a format recognizable to the requesting non-supporting software. SMM code supports providing all da t that would otherwise be provided to supporting software.
摘要:
A system uses a suspend-to-disk operation to save the total processor state of a computer system. With the processor state saved, utility programs such as diagnostic and setup routines, which access to all computer system resources, are executed without the need to reload executing applications or reboot the native operating system controlling the computer system prior to activating the suspend-to-disk operation.
摘要:
Method and apparatus for enabling a suspend-to-disk (S2D) state to be associated with a hard disk to which the operations of a personal computer (PC) have been suspended, rather than with the PC itself. In a preferred embodiment, responsive to initiation of an S2D operation, a partition table stored in a partition sector of the hard disk is copied to a known address within an S2D partition of the hard disk and the copy of the partition table stored in the partition sector is altered such that the S2D partition, rather than a native operating system (OS) partition, is designated as the active partition. The S2D operations continue in a conventional manner, with the state of the PC being saved to the hard disk, at which point the PC is powered off. When the PC is subsequently powered back on, the PC boots up from the S2D partition. A resume-from-disk (RFD) program writes the copy of the partition table previously stored in the S2D partition back to the partition sector and then restores the state of the PC.
摘要:
A method and system of operating a power-managed computer system monitors the life cycle of a hard disk drive attached to the computer system and extends the life span of the hard disk drive by reducing the rate at which hard disk drive spin-up cycles are initiated when the hard drive reaches a predetermined stage it life cycle. Software routines which activate or spin-up the hard drive are extended in capability to read the hard drive serial number and record the serial number in a non-volatile memory in conjunction with an incrementing counter. The incrementing counter counts the number of times the hard drive has been activated from the time of installation of the hard drive. The count of spin-up occurrences is indicative of the operating age of the disk drive. A plurality of age levels are defined, for example medium, old and ancient levels so that, when the hard drive spin-up count reaches one of the defined levels, the power management system changes the operation of the hard drive power management.
摘要:
A computer system is provided with the capability of protecting portions of the mass storage media therein from unauthorized access. The mechanism employed to protect portions of the mass storage media is advantageously operating system independent. Thus, the protection mechanism functions regardless of what operating system is installed or what particular application software is presently being executed. More particularly, the computer system includes a processor configured to execute code in an operational mode and in a system management mode. A mass storage device and a memory are coupled to the processor. At least one region of the mass storage device is designated as a protected region by the user or by the manufacturer. The computer system is configured to trap mass storage device I/O operations and, in response to a trapped mass storage device I/O operation, the processor enters a system management mode. The computer system is configured to prevent execution of the trapped mass storage device I/O operation if the trapped mass storage device I/O operation is directed to a protected region of the mass storage device. However, the computer executes the trapped mass storage device I/O operation if the trapped mass storage device I/O operation is not directed to a protected region of the mass storage device. In this manner, increased computer system security is provided to selected portions of the mass storage device without reliance on protective mechanisms within the operating system or within add-on application software.