ACER CLOUD TECHNOLOGY, INC. Patent applications |
Patent application number | Title | Published |
20150347447 | Method and architecture for synchronizing files - Techniques for providing pervasive synchronization services to digital assets are described. With the synchronization services, copies of a digital asset, regardless where they are physically located as long as they are in predefined or registered storage area (e.g., a folder or repository), are kept synchronized. In other words, when one has made a change to a file on one computer, copies of the file distributed on other computers are all updated with the change. The pervasive synchronization services are performed by using metadata sets of the digital assets without releasing the content of the digital assets. A metadata set includes some or all of header information of a file holding a digital asset and supplemental information generated about the file, wherein the supplemental information includes at least location information to indicate where there are copies of the file. The location information facilitates a computing device to synchronize all the copies of the file with a change made by a user to one of the copies. | 12-03-2015 |
20140325240 | PROGRAMMING ON-CHIP NON-VOLATILE MEMORY IN A SECURE PROCESSOR USING A SEQUENCE NUMBER - An improved secure programming technique involves reducing the size of bits programmed in on-chip secret non-volatile memory, at the same time enabling the typical secure applications supported by secure devices. A technique for secure programming involves de-coupling chip manufacture from the later process of connecting to ticket servers to obtain tickets. A method according to the technique may involve sending a (manufacturing) server signed certificate from the device prior to any communication to receive tickets. A device according to the technique may include chip-internal non-volatile memory to store the certificate along with the private key, in the manufacturing process. | 10-30-2014 |
20130232327 | Operating System Context Switching - A technique for quickly switching between a first operating system (OS) and a second OS involves deactivating the first OS and booting the second OS from memory. The technique can include inserting a context switching layer between the first OS and a hardware layer to facilitate context switching. It may be desirable to allocate memory for the second OS and preserve state of the first OS before deactivating the first OS and booting the second OS from memory. | 09-05-2013 |
20130212413 | Cloud Remote Wakeup - A technique for leveraging cloud resources includes maintaining a resource index for a user for resources that are available from a connected standby device. The resource index can store an identification of resources for an entity (e.g., a user or enterprise) that is stored on a connected standby device. The resource index can include resources of other devices, as well. A connected standby device will generally have at least three power states, online, offline, and connected standby. When a device is online, a processor of the device is powered up and capable of handling, e.g., remote requests for resources. When a device is offline, the device may or may not be off, but is in any case not responsive to remote access. When a device is on connected standby, a processor of the device is powered down, but the device is responsive to a wakeup packet, enabling the device to respond to a resource request, typically after a short delay while the processor powers up. | 08-15-2013 |