25th week of 2011 patent applcation highlights part 81 |
Patent application number | Title | Published |
20110153986 | PREDICTING AND AVOIDING OPERAND-STORE-COMPARE HAZARDS IN OUT-OF-ORDER MICROPROCESSORS - A method and information processing system manage load and store operations executed out-of-order. At least one of a load instruction and a store instruction is executed. A determination is made that an operand store compare hazard has been encountered. An entry within an operand store compare hazard prediction table is created based on the determination. The entry includes at least an instruction address of the instruction that has been executed and a hazard indicating flag associated with the instruction. The hazard indicating flag indicates that the instruction has encountered the operand store compare hazard. When a load instruction is associated with the hazard indicating flag the load instruction becomes dependent upon all store instructions associated with a substantially similar flag. | 2011-06-23 |
20110153987 | REVERSE SIMULTANEOUS MULTI-THREADING - A multi-core processor system supporting simultaneous thread sharing across execution resources of multiple processor cores is provided. The multi-core processor system includes a first processor core with a first instruction queue and dispatch logic in communication with a first execution resource of the first processor core. The multi-core processor system also includes a second processor core with a second instruction queue and dispatch logic in communication with a second execution resource of the second processor core. A high-speed execution resource bus couples the first and second processor cores. The first instruction queue and dispatch logic is configured to issue a first instruction of a thread to the first execution resource and issue a second instruction of the thread over the high-speed execution resource bus to the second execution resource for simultaneous execution of the first and second instruction of the thread on the first and second processor cores. | 2011-06-23 |
20110153988 | METHODS AND APPARATUS TO PERFORM ADAPTIVE PRE-FETCH OPERATIONS IN MANAGED RUNTIME ENVIRONMENTS - Methods and apparatus to perform adaptive pre-fetch operations in managed runtime environments are disclosed herein. An example pre-fetch unit for use with a pre-fetch operation includes a first size function executed by a processor to determine a size of an object associated with a pre-fetch operation; a comparator to compare the size of the object associated with the pre-fetch operation to a first one of a plurality of thresholds; and a fetcher to pre-fetch an amount of memory defined by a first one of a plurality of size definitions corresponding to the first threshold when the comparator determines that the size of the object is less than the first threshold. | 2011-06-23 |
20110153989 | SYNCHRONIZING SIMD VECTORS - A vector compare-and-exchange operation is performed by: decoding by a decoder in a processing device, a single instruction specifying a vector compare-and-exchange operation for a plurality of data elements between a first storage location, a second storage location, and a third storage location; issuing the single instruction for execution by an execution unit in the processing device; and responsive to the execution of the single instruction, comparing data elements from the first storage location to corresponding data elements in the second storage location; and responsive to determining a match exists, replacing the data elements from the first storage location with corresponding data elements from the third storage location. | 2011-06-23 |
20110153990 | SYSTEM, APPARATUS, AND METHOD FOR SUPPORTING CONDITION CODES - An apparatus is described having decode circuitry to decode a first instruction, wherein the first instruction indicates that a copy of a plurality of condition codes bits is to be copied from a first register to a second register. The apparatus also has first execution circuitry to copy a plurality of condition code bits from a first register to a second register. | 2011-06-23 |
20110153991 | DUAL ISSUING OF COMPLEX INSTRUCTION SET INSTRUCTIONS - A system and method for issuing a processor instruction to multiple processing sections arranged in an out-of-order processing pipeline architecture. The multiple processing sections include a first execution unit with a pipeline length and a second execution unit operating upon data produced by the first execution unit. An instruction issue unit accepts a complex instruction that is cracked into respective micro-ops for the first execution unit and the second execution unit. The instruction issue unit issues the first micro-op to the first execution unit to produce intermediate data. The instruction issue unit then delays for a time period corresponding to the processing pipeline length of the first execution unit. After the delay, a second micro-op is issued to the second execution unit. | 2011-06-23 |
20110153992 | METHODS AND APPARATUS TO MANAGE OBJECT LOCKS - Example methods and apparatus to manage object locks are disclosed. A disclosed example method includes receiving an object lock request from a processor, the lock request associated with object lock code to lock an object, and generating object lock-bypass code based on a type of the processor, the object lock-bypass code to execute in a managed runtime in response to receiving the object lock request. The example method also includes identifying a type of instruction set architecture (ISA) associated with the processor, invoking a checkpoint instruction for the processor based on the identified ISA, suspending the object lock code from executing and executing target code when the object is uncontended, and allowing the object lock code to execute when the object is contended. | 2011-06-23 |
20110153993 | Add Instructions to Add Three Source Operands - A method in one aspect may include receiving an add instruction. The add instruction may indicate a first source operand, a second source operand, and a third source operand. A sum of the first, second, and third source operands may be stored as a result of the add instruction. The sum may be stored partly in a destination operand indicated by the add instruction and partly a plurality of flags. Other methods are also disclosed, as are apparatus, systems, and instructions on machine-readable medium. | 2011-06-23 |
20110153994 | Multiplication Instruction for Which Execution Completes Without Writing a Carry Flag - A method in one aspect may include receiving a multiply instruction. The multiply instruction may indicate a first source operand and a second source operand. A product of the first and second source operands may be stored in one or more destination operands indicated by the multiply instruction. Execution of the multiply instruction may complete without writing a carry flag. Other methods are also disclosed, as are apparatus, systems, and instructions on machine-readable medium. | 2011-06-23 |
20110153995 | ARITHMETIC APPARATUS INCLUDING MULTIPLICATION AND ACCUMULATION, AND DSP STRUCTURE AND FILTERING METHOD USING THE SAME - Disclosed are an arithmetic apparatus including MAC calculation, and a DSP structure and a filtering method using the same. The arithmetic apparatus includes: first and second registers storing one or more pieces of n-bit data (n is a natural number); a third register storing one or more pieces of 2n bit data; a multiplier having a first input terminal connected to the first register, a second input terminal connected to the second and third registers, and multiplying an input value of the first input terminal and that of the second input terminal; and an arithmetic-logic unit (ALU) having a first input terminal connected to an output terminal of the multiplier and a second input terminal feedback-connected to an output terminal, adding an input value of the first terminal and that of the second terminal, and having the output terminal connected to the third register. | 2011-06-23 |
20110153996 | Parallel and Vectored Gilbert-Johnson-Keerthi Graphics Processing - Parallel and vectored data structures may be used in a single instruction multiple data processor that applies the Gilbert-Johnson-Keerthi algorithm. As a result, the performance of multi-core processors doing graphics processing may be increased in some cases. | 2011-06-23 |
20110153997 | Bit Range Isolation Instructions, Methods, and Apparatus - Receiving an instruction indicating a source operand and a destination operand. Storing a result in the destination operand in response to the instruction. The result operand may have: (1) first range of bits having a first end explicitly specified by the instruction in which each bit is identical in value to a bit of the source operand in a corresponding position; and (2) second range of bits that all have a same value regardless of values of bits of the source operand in corresponding positions. Execution of instruction may complete without moving the first range of the result relative to the bits of identical value in the corresponding positions of the source operand, regardless of the location of the first range of bits in the result. Execution units to execute such instructions, computer systems having processors to execute such instructions, and machine-readable medium storing such an instruction are also disclosed. | 2011-06-23 |
20110153998 | Methods and Apparatus for Attaching Application Specific Functions Within an Array Processor - A multi-node video signal processor (VSP | 2011-06-23 |
20110153999 | METHODS AND APPARATUS TO MANAGE PARTIAL-COMMIT CHECKPOINTS WITH FIXUP SUPPORT - Example methods and apparatus to manage partial commit-checkpoints are disclosed. A disclosed example method includes identifying a commit instruction associated with a region of instructions executed by a processor, identifying candidate instructions from the region of instructions, and generating a processor partial commit-checkpoint to save a current state of the processor, the checkpoint based on calculated register values associated with live instructions, and including instruction reference addresses to link the candidate instructions. | 2011-06-23 |
20110154000 | Adaptive optimized compare-exchange operation - A technique to perform a fast compare-exchange operation is disclosed. More specifically, a machine-readable medium, processor, and system are described that implement a fast compare-exchange operation as well as a cache line mark operation that enables the fast compare-exchange operation. | 2011-06-23 |
20110154001 | SYSTEM AND METHOD FOR PROCESSING INTERRUPTS IN A COMPUTING SYSTEM - A system, processor and method are provided for digital signal processing A processor may initiate processing a sequence of instructions followed by an interrupt Each instruction may be processed in respective sequential pipeline slots A branch detector may detect or determine if an instruction is a branch instruction, for example, in turn, for each sequential instruction In one embodiment, the branch detector may detect if an instruction is a branch instruction until at least a first branch instruction is detected. A processor may annul instructions which are determined to be branch instructions when the interrupt occupies a delay slot associated with the branch instruction. An execution unit may execute at least the sequence of instructions to run a program. The branch detector and/or execution unit may be integral or separate from each other and from the processor | 2011-06-23 |
20110154002 | Methods And Apparatuses For Efficient Load Processing Using Buffers - Various embodiments of the invention concern methods and apparatuses for power and time efficient load handling. A compiler may identify producer loads, consumer reuse loads, consumer forwarded loads, and producer/consumer hybrid loads. Based on this identification, performance of the load may be efficiently directed to a load value buffer, store buffer, data cache, or elsewhere. Consequently, accesses to cache are reduced, through direct loading from load value buffers and store buffers, thereby efficiently processing the loads. | 2011-06-23 |
20110154003 | METHODS AND APPARATUS TO DYNAMICALLY OPTIMIZE PLATFORMS - Example methods and apparatus to dynamically optimize platforms are disclosed. A disclosed example method includes configuring a processor to operate in a first mode, executing a workload on the processor, and sampling a plurality of registers associated with a performance monitoring unit (PMU). The example method also includes transforming the sampled plurality of registers into a Gaussian signal, partitioning the probabilistic model representation into a plurality of discrete output symbols, and associating one of the plurality of discrete output symbols with the workload based on a probability value associated with the one of the plurality of discrete output symbols. | 2011-06-23 |
20110154004 | Installing and Configuring Software and/or Hardware Components Using Metadata Representations of Component Interdependencies - Process embodiments, implementations of the process embodiments, and products of the processes are disclosed that may be stored as files on a memory device, or as components in a database. Operating a computer based upon a metadata representation of a component and its interdependency with at least one other component is disclosed. Apparatus embodiments include implementation software components, memory devices and/or servers containing the implementation software component and/or an installation package for the implementation software components. Components may also be hardware components, hardware-software components, or virtual hardware components. | 2011-06-23 |
20110154005 | AUTOMATED BATTERY CALIBRATION - A computing device executes a boot process. During boot process execution, the computing device initiates automatic calibration of a battery connected to the computing device. | 2011-06-23 |
20110154006 | MECHANISM FOR DETECTING A NO-PROCESSOR SWAP CONDITION AND MODIFICATION OF HIGH SPEED BUS CALIBRATION DURING BOOT - Memory channel training parameters are function of electrical characteristics of memory devices, processor(s) and memory channel(s). Training steps can be skipped if the BIOS can determine that the memory devices, motherboard and processor have not changed since the last boot. Memory devices contain a serial number for tracking purposes and most motherboards contain a serial number. Many processors do not provide a mechanism by which the BIOS can track the processor. Described herein are techniques that allow the BIOS to track a processor and detect a swap without violating privacy/security requirements. | 2011-06-23 |
20110154007 | Low energy boot options for devices - A method includes determining an amount of energy in a consumable energy source, such as a battery, that forms part of a device. The method further includes facilitating selection of a next software boot mode for the device from a plurality of possible software boot modes based at least on the determined amount of energy in the consumable energy source. The next software boot mode can be, by example, one of booting a reduced energy user interface enabling the composition and storage of at least one message, booting a reduced energy user interface with a communication protocol stack enabling the composition and transmission of at least one message, and booting a communication protocol stack enabling the transmission of at least one stored message. | 2011-06-23 |
20110154008 | ELECTRONIC DEVICE AND METHOD FOR BOOTING UP AND SHUTTING DOWN THE ELECTRONIC DEVICE - A method for booting up and shutting down an electronic device is applied in the electronic device. The electronic device includes a processor, a first storage, and a second storage. The speed of the processor accessing data from the first storage is faster than the speed of the processor accessing data from the second storage. The second storage stores the boot data for booting up the electronic device. The method includes: receiving signals for booting up the electronic device; detecting whether the first storage stores the boot data; and obtaining the boot data from the first storage to boot up the electronic device if the first storage stores the boot data. A related electronic device is also provided. | 2011-06-23 |
20110154009 | REMOTE MANAGEMENT OF UEFI BIOS SETTINGS AND CONFIGURATION - In an information handling system (IHS), remote management of basic input/output system (BIOS) settings and configuration includes maintaining a BIOS setting/configuration database, providing an application to communicate a BIOS setting/configuration from the database to a BIOS system, determining whether the BIOS setting/configuration communicated from the database to the BIOS system is a special BIOS configuration capsule packet, and validating BIOS setting/configuration. | 2011-06-23 |
20110154010 | SECURITY TO EXTEND TRUST - An exemplary apparatus includes one or more processors; memory; circuitry configured to hash a value associated with core root of trust measurement code and system management code; store the hash in a secure register; load an operating system; validate a certificate associated with the core root of trust measurement code and validate a certificate associated with the system management code; based on the validated certificates, provide an expected hash associated with the core root of trust measurement code and the system management code; decide if the expected hash matches the hash stored in the register; and, if the expected hash matches the hash stored in the register, commence a dynamic root of trust measurement session. Various other apparatuses, systems, methods, etc., are also disclosed. | 2011-06-23 |
20110154011 | METHODS, SYSTEMS, AND APPARATUSES TO FACILITATE CONFIGURATION OF A HARDWARE DEVICE IN A PLATFORM - Embodiments of methods, systems, and apparatuses for configuring a hardware device in a platform are described. In an exemplary method, a configuration message is received that indicates that the hardware device is to be upgraded from a first configuration to a second configuration, wherein the first and second configurations were pre-determined based on previous testing of the hardware device and are stored in the hardware device. The hardware device is then configured to the second configuration. | 2011-06-23 |
20110154012 | Multi-phased computational reconfiguration - Problem solution speed may be increased by dynamically changing processing device computational hardware configuration in concert with respective mathematical phases of an algorithm to match accuracy demands at various phases of computation. Smaller but faster hardware structures may be increased in size using real-time partial or full reconfiguration of a processing device to apply the smallest and fastest possible computational structure for the needed accuracy during each of multiple computational phases. | 2011-06-23 |
20110154013 | ELECTRONIC WASTE AND CARBON FOOTPRINT REDUCTION SYSTEM - An electronic device, a method for manufacturing the electronic device, and a method for using the electronic device. A component unit is provided that has a total performance capacity including an enabled and an additional performance capacities, wherein the additional performance capacity is prevented from being employed by the electronic device until enabled with an access logic run in the electronic device with a key associated with the additional performance capacity. | 2011-06-23 |
20110154014 | DATA EXCHANGE FOR MOBILE DEVICES - A method may include identifying a selected file recipient device based on a location of the file recipient device, a location of a file transmitting device, and an orientation of a file transmitting device. A file transfer request may be transmitted to the selected file recipient device. An acknowledgement may be received from the selected file recipient device based on the orientation of the selected file recipient device being approximately 180 degrees offset from the orientation of the file transmitting device. A selected file may be transmitted to the file recipient device following receipt of the acknowledgement. | 2011-06-23 |
20110154015 | Method For Segmenting A Data File, Storing The File In A Separate Location, And Recreating The File - A method includes transmitting file identifying information to a dispatch server; receiving from the dispatch server a storage location identifier and a distribution algorithm identifier; performing the distribution algorithm to generate a distribution map for segments of the file; and transmitting the file segments to storage locations in accordance with the distribution map. The distribution map indicates for each file segment a segment size and a storage destination for that segment. The storage location identifier may identify a server cluster; the dispatch server and the server cluster may be located at a third-party facility physically and/or logically remote from the client. A plurality of distribution algorithms may be provided, so that the distribution algorithm and the distribution map for one stored file are distinct from the distribution algorithm and the distribution map for another stored file. | 2011-06-23 |
20110154016 | METHOD FOR AGGREGATING INFORMATION VALUES IN A NETWORK - A method for aggregating information values in a network, the network including trusted network nodes and untrusted network nodes, wherein a communication session is established by directing messages through the network along a network path from an originating network node ( | 2011-06-23 |
20110154017 | SYSTEMS AND METHODS FOR EVALUATING AND PRIORITIZING RESPONSES FROM MULTIPLE OCSP RESPONDERS - The present invention is directed towards systems and methods for determining a status of a client certificate from a plurality of responses for an Online Certificate Status Protocol (OCSP) request. An intermediary device between a plurality of clients and one or more servers identifies a plurality of OCSP responders for determining a status of a client certificate responsive to receiving the client certificate from a client during a Secure Socket Layer (SSL) handshake. Each of the plurality of OCSP responders may transmit a request for the status of the client certificate to a uniform resource locator corresponding to each OCSP responder. The intermediary device may determine a single status for the client certificate from a plurality of statuses of the client certificate received via responses from each uniform resource locator. | 2011-06-23 |
20110154018 | SYSTEMS AND METHODS FOR FLASH CROWD CONTROL AND BATCHING OCSP REQUESTS VIA ONLINE CERTIFICATE STATUS PROTOCOL - The present invention is directed towards systems and methods for batching OCSP requests and caching corresponding responses. An intermediary between a plurality of clients and one or more servers receives a first client certificate during a first SSL handshake with a first client and a second client certificate during a second SSL handshake with a second client. The intermediary may identify that the statuses of the client certificates are not in a cache of the intermediary. An OCSP responder of the intermediary may transmit a single request to an OCSP server to determine the statuses. The intermediary may determine, from a single response received from the OCSP server, whether to establish SSL connections with the clients based on the statuses. The intermediary may store the statuses to the cache for determining whether to establish a SSL connection in response to receiving a client certificate from the first client. | 2011-06-23 |
20110154019 | Graceful Conversion of a Security to a Non-security Transparent Proxy - A graceful conversion of a security to a non-security transparent proxy is performed. A security transparent proxy is an intermediary between two end devices, with an established secure connection with each end device using different security keys. In response to a policy decision or other stimulus, the security transparent proxy is gracefully converted to a non-security transparent proxy such that it can forward, without decrypting and encrypting, the information received from a first endpoint on the first connection therewith to the second endpoint on the second connection therewith. This conversion is “graceful” in that it does not drop either of the two original sessions. In one embodiment, this graceful conversion is accomplished by triggering a key renegotiation on both of the two sessions such that the two connections will use the same encryption key. | 2011-06-23 |
20110154020 | Conditionally releasing a communique determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects - A computationally implemented method includes, but is not limited to: intercepting a communiqué that is determined to be affiliated with a source entity and that is addressed to an end user to prevent, at least temporarily, the communiqué from being received by a communication device associated with the end user; and releasing the communiqué to the communication device in response to at least detecting occurrence of one or more environmental aspects associated with the communication device, the releasing of the communiqué being in accordance with one or more conditional directives of the end user to conditionally obfuscate the communiqué determined to be affiliated with the source entity. In addition to the foregoing, other method aspects are described in the claims, drawings, and text forming a part of the present disclosure. | 2011-06-23 |
20110154021 | APPARATUS AND METHOD TO PREVENT MAN IN THE MIDDLE ATTACK - A system, peripheral device, and method for authenticating an encryption key before transmitting encrypted messages containing sensitive information are provided. Authentication of a client device during the coordination of data transfer among multiple computer devices is possible by providing a peripheral device that does not have a direct connection to a network, but rather, any message to be transmitted over the network must be relayed through a client device. Any sensitive information to be transferred to a remote device is inserted into a message, then the message is encrypted in the peripheral device. This prevents any process running on the client device from fooling the client device into communicating confidential information to a third party rather than the desired remote computer, because the client device never sees the sensitive information in an unencrypted form; only the peripheral device has access to the sensitive information in an unencrypted form. | 2011-06-23 |
20110154022 | Method and Apparatus for Machine-to-Machine Communication - According to a first aspect of the present invention there is provided a method of at least partly delegating processing of data in a machine-to-machine system to reduce computational load on a broker entity | 2011-06-23 |
20110154023 | Protected device management - A method, apparatus, system, and computer program product for management of storage devices protected by encryption, user authentication, and password protection and auditing schemes in virtualized and non-virtualized environments. | 2011-06-23 |
20110154024 | METHOD AND APPARATUS FOR SELECTING A CERTIFICATE AUTHORITY - A certificate authority selection unit implements a method for selecting one of a plurality of certificate authorities servicing a plurality of administrative domains in a communication system. The method includes: receiving, from an end-entity via an interface, a certificate service request associated with an identifier; selecting, based on the identifier, one of the plurality of administrative domains in the communication system, wherein the plurality of administrative domains are serviced by a plurality of certificate authorities; retrieving a security profile for the end-entity; and selecting, based on the security profile for the end-entity, one of the plurality of certificate authorities to process the certificate service request. | 2011-06-23 |
20110154025 | COMPUTER IMPLEMENTED METHOD FOR AUTHENTICATING A USER - The invention relates to a computer implemented method for performing a user authentication, wherein an asymmetric cryptographic key pair is associated with the user, said key pair comprising a public key and a private key, wherein the method comprises selecting the user to be authenticated using a pseudonym of said user, wherein said pseudonym comprises the public key of the user, the method further comprising performing a cryptographic authentication of the user using the asymmetric cryptographic key pair. | 2011-06-23 |
20110154026 | SYSTEMS AND METHODS FOR PARALLEL PROCESSING OF OCSP REQUESTS DURING SSL HANDSHAKE - The present invention is directed towards systems and methods for processing an Online Certificate Status Protocol (OCSP) request in parallel to processing a Secure Socket Layer (SSL) handshake. The method includes transmitting, by an OCSP responder of an intermediary device between a plurality of clients and one or more servers, an OCSP request to a OCSP server for a status of a client certificate responsive to receiving the client certificate from a client during a SSL handshake. The intermediary device may continue to perform remaining portions of the SSL handshake while the OCSP request to the OCSP server is outstanding. The intermediary device may establish an SSL connection for the SSL handshake. The intermediary device may determine whether to terminate or maintain the established SSL connection based on the status of the client certificate received via a response from the OCSP server. | 2011-06-23 |
20110154027 | METHOD AND SYSTEM FOR CO-TERMINATION OF DIGITAL CERTIFICATES - A method of renewing a plurality of digital certificates includes receiving, at a first time, a request from a user to renew a first digital certificate and determining an expiration date for the first digital certificate. The method also includes receiving, at a second time, a request from the user to renew a second digital certificate and determining an expiration date for the second digital certificate. The expiration date for the second certificate is later than the expiration date for the first certificate. The method further includes determining a new expiration date occurring after the first time and the second time and renewing the first digital certificate. An expiration date for the renewed first digital certificate is equal to the new expiration date. Moreover, the method includes renewing the second digital certificate. An expiration date for the renewed second digital certificate is equal to the new expiration date. | 2011-06-23 |
20110154028 | SYSTEM AND METHOD FOR ADMINISTERING DIGITAL CERTIFICATE CHECKING - Systems and methods for handling electronic messages. An electronic message that is associated with a digital certificate is to be processed. A decision whether to check the validity of the digital certificate is based upon digital certificate checking criterion. An IT administrator may provide to one or more devices configuration data that establishes the digital certificate checking criterion. | 2011-06-23 |
20110154029 | METHOD OF ENCRYPTING CONTROL SIGNALING - A method of protecting control signaling transceived between a mobile station and a base station in a wireless access system is disclosed. And, a method of encrypting control signals selectively is disclosed. The present invention defines new control signal encryption key (CSEK) and group control signal encryption key (GCSEK) for encrypting a control signal and discloses methods of protecting a control signal using the control signal encryption keys. Moreover, although the new control signal encryption key and the like are not used, the present invention efficiently protects control signaling by selectively encrypting control signals. | 2011-06-23 |
20110154030 | Methods and apparatus for restoration of an anti-theft platform - Embodiments of methods for restoration an anti-theft platform are generally described herein. Other embodiments may be described and claimed. | 2011-06-23 |
20110154031 | Secure Kerberized Access of Encrypted File System - A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client. | 2011-06-23 |
20110154032 | Mobile Security System and Method - A system and method for providing a secure environment for mobile telephones and other devices are disclosed. The system and method may utilize trust zoning, layered memory, and a secure matrix model having, for example, a memory protection module for protecting memory; a secure debug module for ensuring security of the debug module; a secure file system module for protecting the secure file system; and a trusted time source module for protecting components. Embodiments of the present invention may protect against security attacks on a variety of hardware and software components while permitting suitable levels of accessibility for developmental and maintenance purposes. | 2011-06-23 |
20110154033 | ONLINE STORAGE SERVICE SYSTEM AND ITS DATA CONTROL METHOD - A WEB service providing server can execute WEB service processing using data provided by an online storage service providing server, and leaking of data at the WEB service providing server can be prevented. | 2011-06-23 |
20110154034 | DYNAMICALLY REACTING POLICIES AND PROTECTIONS FOR SECURING MOBILE FINANCIAL TRANSACTIONS - A secure mobile financial transaction is provided by receiving a list of protection methods from an external terminal over a communication network. A matrix of protection methods corresponding to the external terminal is created based on the identified protection methods. Security-related information is received from one or more trust mediator agents over the communication network. Rules corresponding to the received security related information are retrieved, and at least one protection method is selected from the matrix of protection methods based on the retrieved rules. The selected protection method is transmitted to the trust mediator agents for implementation. | 2011-06-23 |
20110154035 | Method and apparatus for client-driven profile update in an enterprise wireless network - A technique for allowing client-driven profile updates in a wireless network uses a shared character password and a shared image that is known by both a client device and a network server. In some embodiments, a random character table is generated by a client device and is used, along with the shared character password and shared image, to calculate a one-time password (OTP). The OTP is then used to both encrypt and sign a new security profile to be delivered to the network server in a profile update request. The server may then generate the same OTP using information within the request and the shared character password and shared image. The new profile may then be decrypted and validated within the server. | 2011-06-23 |
20110154036 | Method For Implementing Encryption And Transmission of Information and System Thereof - The invention discloses a method for implementing encryption and tranmission information and system thereof. The method comprises the following steps when a sender sends information to a receiver: a client of the sender encrypts the information by using a unique identifier of a receiver identity as a public key; the sender sends the encrypted information to the receiver; the receiver receives the encrypted information, and a client of the receiver performs decryption by using a user private key; wherein the client of the receiver obtains the user private key by one-off registration and the user private key matches with the unique identifier of the receiver identity. The system comprises an information transmission platform, a sender and a receiver connected to each other by the information transmission platform, clients provided in the sender and the receiver, and a registration component. According to the present invention, secure communication between the sender and the receiver is realized without a process of establishing any initial key, and the negotiation process between the sender and the receiver before encryption/decryption and the interactions with any other entities during every encryption/decryption procedure are avoided. | 2011-06-23 |
20110154037 | SECURE DIGITAL COMMUNICATIONS - There is disclosed a method in a communications system for enabling authentication of a sender device and a receiver device in the communication system, wherein the sender device is associated with a self-generated first identity and a first master device, the receiver device is associated with a self-generated second identity and a second master device and wherein the authentication is enabled by utilizing the first master device and the second master device for the sender device and the receiver device to verify the identities of each other. In one embodiment, both the sender device and the receiver device are also associated with a third device ant the third device is used in addition to the master devices for verifying said identities. There is also disclosed a method In a sender device, a method in a receiver device, a method in a third device, a sender device, a receiver device, a third device, and a computer program product for the same. | 2011-06-23 |
20110154038 | Multi-band/multi-link secure key generation and delivery protocol - A method is described for negotiating the use of multi-link ciphering and for the generation of unique keys for each of the links using a single 4-way handshake protocol exchange. | 2011-06-23 |
20110154039 | STATION-TO-STATION SECURITY ASSOCIATIONS IN PERSONAL BASIC SERVICE SETS - A personal basic service set (PBSS) includes a first device configured to communicate in the PBSS and a second device configured to communicate in the PBSS. The first device is configured to establish a robust security network association (RSNA) with the second device (i) without associating with a PBSS control point (PCP) and (ii) without associating with the second device. | 2011-06-23 |
20110154040 | MESSAGE STORAGE AND RETRIEVAL - A method of obfuscating messages stored in a message store or messages received by a computing device by comparing portions of the messages to user-specified criteria and encrypting or hiding portions of the message if the criteria are matched. The obfuscated messages are stored and access thereto is controlled by only permitting authorised users or applications to decrypt or access the message. | 2011-06-23 |
20110154041 | METHOD TO SECURELY TRANSFER USER ENCRYPTION KEYS AND SERVICES BETWEEN MOBILE DEVICES - A method for securely transferring a service from a first mobile device to a second mobile device, the service being associated with a server configured for facilitating provisioning of services to mobile devices over a wireless communications network. The method includes generating in the first mobile device a shared key, the shared key being generated using a master key unique to the server and to the first mobile device, the master key being accessible by the server and by the first mobile device; and sending said shared key from the first mobile device to the second mobile device using an alternate communication mechanism independent from the server. | 2011-06-23 |
20110154042 | METHOD AND PROCESSING UNIT FOR SECURE PROCESSING OF ACCESS CONTROLLED AUDIO/VIDEO DATA - A method based on access conditions verification performed by two conditional access devices consecutively on a control message before releasing a control word to a descrambler. The control message encapsulates a second part including another control message. The processing unit for carrying out the method comprises a first conditional access device connected to a second conditional access device provided with a descrambler and a secured processor or secured hardware logic. The control message and the second part are each encrypted and accompanied by respectively first and second authentication data. The first conditional access device decrypts and verifies integrity of the control message, verifies the first access conditions and transmits the second part to the second access control device. The second conditional access device decrypts and verifies integrity of the second part and further verifies the second access conditions, and releases and loads the control word into the descrambler. | 2011-06-23 |
20110154043 | SYSTEMS AND METHODS FOR CRYPTOGRAPHICALLY ENHANCED AUTOMATIC BLACKLIST MANAGEMENT AND ENFORCEMENT - Embodiments relate to systems and methods for the management and enforcement of blacklists of counterfeited, cloned or otherwise unauthenticated devices. In an embodiment, a system comprises an accessory comprising an authentication chip including data signed by a private verification key, the data including a unique identifier related to the accessory, and a device comprising a public verification key forming a verification key pair with the private verification key and an identifier list, the device configured to read the data from the authentication chip, compare the unique identifier with the identifier list, and reject the accessory if the unique identifier is found in the identifier list. | 2011-06-23 |
20110154044 | COMPUTER IMPLEMENTED METHOD FOR SENDING A MESSAGE TO A RECIPIENT USER, RECEIVING A MESSAGE BY A RECIPIENT USER, A COMPUTER READABLE STORAGE MEDIUM AND A COMPUTER SYSTEM - The invention relates to a computer implemented method for sending a message to a recipient user, wherein a recipient asymmetric cryptographic key pair is associated with the recipient user, said key pair comprising a public recipient key and a private recipient key, the method comprising sending the message to said recipient user with the recipient address to which the message is sent comprising the public recipient key. | 2011-06-23 |
20110154045 | ANONYMOUS AUTHENTICATION SERVICE METHOD FOR PROVIDING LOCAL LINKABILITY - There is provided an anonymous service method of providing local linkability. The anonymous service method providing local linkability according to exemplary embodiments of the invention, an anonymous authentication operation based on a short group signature is performed, for which the concept of a local linkability is introduced to secure linkability within the same service domain. Namely, in the interior of a service provider, a virtual index having a fixed value is calculated for each service user, and in this case, although a plurality of service providers collude with each other, they cannot calculate a virtual index having the same value, whereby the linkability can be secured within the same service domain but not within the interiors of different service domains. | 2011-06-23 |
20110154046 | METHOD AND APPARATUS FOR STORAGE OF DATA FOR MANUFACTURED ITEMS - Exemplary embodiments are directed to a method and apparatus for storage of data for a batch of manufactured items. The method comprises defining, by a lower limit identifier and an upper limit identifier, a range of unique item identifiers for the batch, wherein each manufactured item in the batch is allocated a unique item identifier falling within the range. The number of unique item identifiers allocated to the manufactured items is smaller than the number of unique item identifiers in the range. The unique item identifiers allocated to the manufactured items are defined by the lower limit item identifier of the range, the upper limit item identifier of the range and an indication of those item identifiers in the range which are not allocated to a manufactured item. | 2011-06-23 |
20110154047 | USER-DEFINED PASSWORDS HAVING ASSOCIATED UNIQUE VERSION DATA TO ASSIST USER RECALL OF THE PASSWORD - An electronic device includes password protected functionality using a password that can be changed by the user. A user-specified password is stored in association with unique version data that is subsequently provided to help user recall of the password associated therewith. | 2011-06-23 |
20110154048 | Dynamically Mitigating A Noncompliant Password - Techniques are disclosed for dynamically mitigating a noncompliant password. The method comprises obtaining a password; generating one or more quality scores for the password using a password policy for an authentication and authorization service; determining whether the password has sufficient score quality; in response to determining that the password does not have sufficient score quality, granting to the user a different level of access to the service than if the password meets the quality criteria; wherein the method is performed by one or more computing devices. | 2011-06-23 |
20110154049 | SYSTEM AND METHOD FOR PERFORMING DATA BACKUP OF DIGITAL VIDEO RECORDER - A system and method for performing data backup of a digital video recorder determines if a second safe mechanism key stored in a secure digital (SD) card is valid when the SD card is detected by the digital video recorder, and changes a data storage path from a first hard disk of the digital video recorder to the SD card if the safe mechanism key stored in the SD card is valid. The system and method further changes the data storage path from the SD card to a second hard disk when the second hard disk is installed, and copies backup data stored in the SD card to the second hard disk. | 2011-06-23 |
20110154050 | SYSTEM AND METHOD FOR SELECTIVELY PROVIDING CRYPTOGRAPHIC CAPABILITIES BASED ON LOCATION - A system and method of providing cryptographic functionality includes receiving a request to perform a cryptographic operation in a mobile electronic device, determining whether the cryptographic operation is permitted to be performed by the mobile electronic device based on the current location of the mobile electronic device, and performing the cryptographic operation in the mobile electronic device only if it is determined that the cryptographic operation is permitted. | 2011-06-23 |
20110154051 | SECURING EXECUTION OF COMPUTATIONAL RESOURCES - Controlling access to computational features includes: preparing a computational resource for execution by an execution system that has been provided a primary descriptor containing an identity value and that has associated a feature indicator with the primary descriptor; accessing a secondary descriptor containing the identity value and cryptographically assigned to the computational resource; and granting the computational resource access to a computational feature of the execution system based on the feature indicator. | 2011-06-23 |
20110154052 | MEDIA-FOLLOWING ENCRYPTION POLICY CONTROL - Example articles of manufacture, methods, and systems facilitate having encryption policy follow an article of manufacture like a tape cartridge. One example article of manufacture includes a media portion (e.g., tape) and a non-media portion (e.g., housing). The media portion is configured to store machine readable information. The article of manufacture could be a tape, a disk, a memory, and other computer readable media. The article of manufacture also includes an encryption policy information indicator. The encryption policy information indicator can be configured to store information that controls an encryption policy associated with the article of manufacture. Therefore, encryption policy can, for example, follow a tape cartridge rather than be resident solely in a controlling application (e.g., tape library). | 2011-06-23 |
20110154053 | Distributed Database - The invention relates to a module to be included onboard the equipment of a telecommunication network and comprising: a database storing at least search field values including URL addresses, at least some of said URL addresses being stored in an encrypted form, encryption means capable of encrypting a piece of information received by the module in order to allow an information search in the database by comparison with the encrypted search field values. | 2011-06-23 |
20110154054 | COMPUTER IMPLEMENTED METHOD FOR GENERATING A PSEUDONYM, COMPUTER READABLE STORAGE MEDIUM AND COMPUTER SYSTEM - The invention relates to a computer implemented method for generating a pseudonym for a user comprising entering a user-selected secret, storing the user-selected secret in memory, computing a private key by applying an embedding and randomizing function onto the secret, storing the private key in the memory, computing a public key using the private key, the public key and the private key forming an asymmetric cryptographic key, erasing the secret and the private key from the memory, and outputting the public key for providing the pseudonym | 2011-06-23 |
20110154055 | COMPUTER READABLE STORAGE MEDIUM FOR GENERATING A PSEUDONYM, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE - The invention relates to a method of generating a pseudonym, the method including accessing an input value and calculating a pseudonym by applying a cryptographic one-way function to the input value, where the cryptographic one-way function is an injective function. In alternative embodiments, the cryptographic one-way function is an embedding and/or randomizing function | 2011-06-23 |
20110154056 | COMPUTER READABLE STORAGE MEDIUM FOR GENERATING AN ACCESS KEY, COMPUTER IMPLEMENTED METHOD AND COMPUTING DEVICE - A computer readable storage medium having stored therein instructions, which when executed by a computing device cause the computing device to perform a method of generating an access key, the method comprising the steps of:
| 2011-06-23 |
20110154057 | SAVING AND RETRIEVING DATA BASED ON PUBLIC KEY ENCRYPTION - In accordance with certain aspects, data is received from a calling program. Ciphertext that includes the data is generated, using public key encryption, in a manner that allows the data to be obtained from the ciphertext only if one or more conditions are satisfied. In accordance with another aspect, a bit string is received from a calling program. Data in the bit string is decrypted using public key decryption and returned to the calling program only if one or more conditions included in the bit string are satisfied. | 2011-06-23 |
20110154058 | METHOD AND APPARATUS FOR STORING AND VERIFYING DATA - Embodiments of the present invention provide a method of storing data, comprising: updating a counter, and storing data and a value of the updated counter together in encrypted form; and a method of verifying data, comprising decrypting stored data to recover a data element value, and comparing the data element value against a counter to verify the stored data. | 2011-06-23 |
20110154059 | CUMULATIVE INTEGRITY CHECK VALUE (ICV) PROCESSOR BASED MEMORY CONTENT PROTECTION - In general, in one aspect, the disclosure describes a process that includes a cryptographic engine and first and second registers. The cryptographic engine is to encrypt data to be written to memory, to decrypt data read from memory, to generate read integrity check values (ICVs) and write ICVs for memory accesses. The cryptographic engine is also to create a cumulative read ICV and a cumulative write ICV by XORing the generated read ICV and the generated write ICV with a current read MAC and a current write ICV respectively and to validate data integrity by comparing the cumulative read ICV and the cumulative write ICV. The first and second registers are to store the cumulative read and write ICVs respectively at the processor. Other embodiments are described and claimed. | 2011-06-23 |
20110154060 | IMPLEMENTING SECURE ERASE FOR SOLID STATE DRIVES - A method and apparatus are provided for implementing secure erase for solid state drives (SSDs). An encryption key is used to encrypt data being written to SSD. A controller identifies a key storage option, and responsive to the identified key storage option, stores a key for data encryption and decryption. The controller deletes the key within the SSD responsive to the identified key storage option, ensuring that once the key is deleted, the key is not recoverable and data is effectively erased. | 2011-06-23 |
20110154061 | DATA SECURE MEMORY/STORAGE CONTROL - A method includes encrypting, in a security engine associated with a memory/storage controller of a memory/storage device in a data processing device, a pre-encrypted/unencrypted data stream associated with a multimedia content in accordance with a data write request to transfer the pre-encrypted/unencrypted data stream to the memory/storage device using a security key configured to uniquely identify the data processing device during each data write session and a security flag configured to uniquely identify each data write session during a secure mode of operation. The method also includes transmitting the security engine encrypted data stream to the memory/storage device in accordance with the data write request, and decrypting the security engine encrypted data stream using the security key and the security flag in accordance with a data read request to read the security engine encrypted data stream stored in the memory/storage device. | 2011-06-23 |
20110154062 | PROTECTION OF ELECTRONIC SYSTEMS FROM UNAUTHORIZED ACCESS AND HARDWARE PIRACY - A method of designing an electronic system is provided to protect the electronic system from unauthorized access and hardware piracy. The method includes describing the electronic system in a first design and replacing a portion of the electronic system with a reconfigurable module to generate a second design. The reconfigurable module includes a reconfigurable logic block and a configuration block for storing configuration data. The method also includes encrypting configuration data and saving the encrypted configuration data separately from the reconfigurable module. The reconfigurable logic block is configured to correspond to the portion of the electronic system in the first design when the configuration data is loaded in the configuration block. | 2011-06-23 |
20110154063 | INFORMATION MANAGEMENT SYSTEM, INFORMATION MANAGEMENT METHOD AND APPARATUS, AND ENCRYPTION METHOD AND PROGRAM - An information management system provided with an encrypting means for encrypting an original file to prepare an encrypted file, a data storage memory which stores the encrypted file, a decrypting means, a general memory, an information managing means for decrypting the encrypted file to an editable display file etc. and storing it in the general memory in a regular operational processing cycle, performing the required editing in the form of the display file etc., converting the display file etc. after editing to an encrypted file by the encrypting means, and storing this in the data storage memory, and an information management file which controls processing of or operations on the encrypted file by the information managing means. This standardizes information management at the different levels of an organization, managers, etc., enables secure protection and management of information contained in the different machinery and equipment, lightens the load of information management, prevents leakage of information, and preserves and protects files and prevents their destruction, tampering, and alteration. | 2011-06-23 |
20110154064 | Dynamic Energy Managment - A computer system with reliable dynamic energy management includes a thread synchronized energy configurator, the thread synchronized energy configurator extending an instruction decoder of the computer system and the thread synchronized energy configurator is disposed to append an energy configuration field including energy configuration bits to pipeline control bits of instructions in the instruction decoder, a thread synchronized dynamic frequency shifter (DFS), the thread synchronized DFS disposed to set control signals indicative of a frequency shift both per thread and per pipeline, and a thread synchronized general purpose register (GPR) super scaler, wherein the GPR super scaler is disposed to optimize thread operation based upon the set control signals. | 2011-06-23 |
20110154065 | OPERATING SYSTEM INDEPENDENT NETWORK EVENT HANDLING - Methods and apparatuses for re-instantiating a firmware environment that includes one or more firmware functions available at pre-boot time when transitioning the computing device from a wake state to a sleep state. A network event received by the computing device while in a sleep state may be handled by the firmware environment independent of the operating system and without returning the entire computing device to the wake state. | 2011-06-23 |
20110154066 | POWER MANAGEMENT SYSTEM AND METHOD - A power manager controls the supply voltage level at a load according to load current demand, and optionally the impedance of the power delivery path, by adjusting the supply voltage. The supply voltage may be reduced by determining a fixed load current that corresponds to a first operating frequency, determining a supply voltage that corresponds to the fixed load current, and then powering the load based on the supply voltage. Alternatively, the supply voltage may be increased along with increasing the operating frequency of the load while maintaining system power consumption within a predetermined limit. | 2011-06-23 |
20110154067 | WORKLOAD POWER CONSUMPTION PROJECTION ON INFORMATION HANDLING SYSTEM - The projected power consumption for an application program running on a future IHS is determined by generating a power proxy for the application program, and power proxies for a plurality of standard benchmarks. An algorithm correlates the power proxy for the application program, and the power proxies for the standard benchmarks to generate weighted surrogates that are combined with power proxies derived from running the benchmark surrogates on the future IHS to generate the projected power consumption. | 2011-06-23 |
20110154068 | Switched capacitor voltage regulator with high efficiency over a wide voltage range - In some embodiments, a voltage regulator device may include a switched capacitor voltage regulator to receive an input voltage and to provide an output voltage to a load, and a control unit to receive information related to a desired output voltage for the switched capacitor voltage regulator and to determine a desired input voltage for the switched capacitor voltage regulator based on the desired output voltage and selected operation mode or modes of switched capacitor voltage regulator. Other embodiments are disclosed and claimed. | 2011-06-23 |
20110154069 | DYNAMIC POWER STATE DETERMINATION - According to some embodiments, a method and apparatus are provided to determine a first operating point and a second operating point associated with a graphics processing unit, automatically determine a plurality of voltage/frequency values between the first operating point and the second operating point, and define a plurality of power states of the graphic processing unit. One or more of the power states may be associated with one of the plurality of voltage/frequency values. Each of the plurality of voltage/frequency values may include both a voltage and a frequency. | 2011-06-23 |
20110154070 | Power Control Optimization in a Communication Network - The present invention relates to power control optimization in a communication network aiming at increased flexibility for controlling the power consumption in a network node ( | 2011-06-23 |
20110154071 | METHOD AND APPARATUS FOR POWER PROFILE SHAPING USING TIME-INTERLEAVED VOLTAGE MODULATION - Embodiments of an apparatus, system and method are described for dynamically time-interleaving supply voltage modulation to shape a power profile. An apparatus may comprise, for example, a power management module to monitor power information received from a plurality of devices and send a power control signal including delay information to each device having power information that exceeds a power threshold, the delay information comprising information for time-interleaving power usage among the devices having power information that exceeds the power threshold. Other embodiments are described and claimed. | 2011-06-23 |
20110154072 | DATA STORAGE SYSTEM WITH POWER MANAGEMENT AND METHOD OF OPERATION THEREOF - A method of operation of a data storage system includes: providing a standby power source; detecting activity on a communication channel with an upstream re-driver powered with the standby power source; generating a signal-detect output from the upstream re-driver based on the activity; determining a link status with a power control unit based on the signal-detect output, the power control unit powered with the standby power source; and generating a power output from a power supply unit based on the link status, the power supply unit controlled by the power control unit. | 2011-06-23 |
20110154073 | SYSTEMS AND METHODS FOR ENERGY EFFICIENT LOAD BALANCING AT SERVER CLUSTERS - Methods and systems to balance the load among a set of processing units, such as servers, in a manner that allows the servers periods of low power consumption. This allows energy efficient operation of the set of processing units. Moreover, the process is adaptable to variations in systemic response times, so that systemic response times may be improved when operational conditions so dictate. | 2011-06-23 |
20110154074 | POWER MANAGEMENT METHOD AND COMPUTER SYSTEM APPLYING THE SAME - A power management method adapted in a computer system is provided. The computer system includes a main monitor and a host. A management method includes the following steps. First, whether the main monitor is turned off or not is determined. When the main monitor is turned off, a power saving program is executed to reduce the power of the host. Furthermore, a computer system applying the above power management method is also provided. | 2011-06-23 |
20110154075 | DATA NEGOTIATION USING SERIAL VOLTAGE IDENTIFICATION COMMUNICATION - According to some embodiments, a method and system are provided to initiate communication at an integrated circuit that is electrically coupled to a plurality of voltage regulators, determine a slowest one of the plurality of voltage regulators that is electrically coupled to the processor, transmit address information to the plurality of voltage regulators that are electrically coupled to the processor at a first speed associated with the slowest one of the plurality of voltage regulators, determine a second speed associated with a voltage regulator to which the address information is associated, and transmit a second portion of the packet at the second speed associated with the voltage regulator to which the address information is associated. | 2011-06-23 |
20110154076 | TIME NEGOTIATION USING SERIAL VOLTAGE IDENTIFICATION COMMUNICATION - According to some embodiments, a method and system are provided to initiate communication at an integrated circuit that is electrically coupled to a plurality of voltage regulators, determine a slowest one of the plurality of voltage regulators that is electrically coupled to the integrated circuit, and communicate with the plurality of voltage regulators that are electrically coupled to the integrated circuit at a speed associated with the slowest one of the plurality of voltage regulators. | 2011-06-23 |
20110154077 | ELECTRONIC APPARATUS AND METHOD OF CONTROLLING ELECTRONIC APPARATUS - An electronic apparatus is provided. A management hoard includes: a control section; a real-time clock that outputs data indicating current date and time to the control section; a memory that stores fiscal data including the data indicating the current date and time and fiscal information under the control of the control section; and a power source that supplies power to the real-time clock through a power supply path. A housing box includes a box main body and a cover. The housing box that houses the management board. When the cover is in a closed state, the power supply path is formed and the power is supplied to the real-time clock. When the cover is placed in an open state, the power supply path is shut off and the power supplied to the real-time clock is shut off. | 2011-06-23 |
20110154078 | METHOD AND APPARATUS FOR MONITORING, ASSESSING, AND MANAGING POWER SOURCE PERFORMANCE - An approach is provided for monitoring, assessing, and managing power source performance. Depletion of a power source of a mobile device caused by executing a plurality of activities is determined. A duration value is determined for executing each of the activities. The duration values are attributed to the depletion. Statistical data corresponding to performance of the power source is generated. | 2011-06-23 |
20110154079 | Instruction For Enabling A Procesor Wait State - In one embodiment, the present invention includes a processor having a core with decode logic to decode an instruction prescribing an identification of a location to be monitored and a timer value, and a timer coupled to the decode logic to perform a count with respect to the timer value. The processor may further include a power management unit coupled to the core to determine a type of a low power state based at least in part on the timer value and cause the processor to enter the low power state responsive to the determination. Other embodiments are described and claimed. | 2011-06-23 |
20110154080 | METHOD AND APPARATUS FOR I/O DEVICES ASSISTED PLATFORM POWER MANAGEMENT - Embodiments of an apparatus, system and method are described for input/output (I/O) device assisted platform power management. An apparatus may comprise, for example, power management logic operative to receive idle duration information from one or more input/output (I/O) devices and to modify a power state for one or more components based on the idle information. Other embodiments are described and claimed. | 2011-06-23 |
20110154081 | DYNAMIC POWER REDUCTION - Some embodiments of the invention include systems, apparatuses, and methods for dynamically reducing requested supply voltage based on idle functional blocks. | 2011-06-23 |
20110154082 | I/O CO-PROCESSOR COUPLED HYBRID COMPUTING DEVICE - An apparatus and method provide power to perform functions on a computing device. In one example, the apparatus contains multiple processors that may operate at different power levels to consume different amounts of power. Also, any of the multiple processors may perform different functions. For example, one processor may be a low power processor that may control or operate at least one peripheral device to perform a low capacity function. Control may also switch from the low power processor to a high capacity processor. In one example, the high capacity processor controls the low power processor and further controls the at least one peripheral device through the lower power processor. | 2011-06-23 |
20110154083 | Processor and Memory Folding for Energy Management - A method, system and computer-usable medium are disclosed for managing power consumption in information processing systems. Processing resources are successively folded, allowing them to be placed into deeper and deeper power saving states while maintaining the ability to respond to new processing loads without exposing the latency of the deeper power saving states as they are unfolded. Before a deeper power saving state can be used, there must be sufficient processing resources in the prior power saving state to mask the latency of bringing a processing resource out of the deeper power saving state. | 2011-06-23 |
20110154084 | EFFICIENT SERVICE ADVERTISEMENT AND DISCOVERY IN A PEER-TO-PEER NETWORKING ENVIRONMENT - A local device broadcasts a service advertisement in a wireless network, where the service advertisement includes one or more service identifiers (IDs) identifying one or more services being advertised and an availability schedule of the local device. Optionally, the local device reduces power to at least a portion of the local device and wakes up at a time according to the availability schedule. The local device listens in the wireless network according to the availability schedule of the local device. In response to a service request received from a remote device during the availability window, the local device transmits a service response to the remote device. The service request includes one or more service IDs identifying one or more services being inquired by the remote device and the service response includes detailed information associated with one or more services identified by the one or more service IDs. | 2011-06-23 |
20110154085 | System Management and Power Control - Systems and methods are disclosed for managing a communication and control of power components. The system includes a parallel bus and plural peripheral devices. Each peripheral device is connected to the parallel bus. The system also includes a control module that is connected to the parallel bus, the control module including memory that stores control data and telemetry data associated with each peripheral device, and an interface that controls access to addressable locations in memory over the parallel bus. | 2011-06-23 |