Patent application number | Description | Published |
20090254769 | Power Profiling Application for Managing Power Allocation in an Information Handling System - A method, system, and software instructions for allocating power in a information handling system are operable to respond to a power profiling request by transitioning a processing resource to a first power consumption state and obtaining and storing a first power consumption value. The first power consumption value is then retrieved and used to allocate power to the first processing resource in response to a power on request. The first power consumption state may be a state in which power consumption approximates a maximum power consumption. The processing resource may be further transitioned to a second power consumption state and a second power consumption value obtained. The second power consumption state may be a reduced performance state. Thereafter, responsive to determining that the system lacks sufficient power budget to fulfill a pending request for power, the processing resource is throttled and power is allocated using the second power consumption value. | 10-08-2009 |
20090319808 | System and Method for Smoothing Power Reclamation of Blade Servers - A modular enclosure including first, second, third, and fourth servers, and a chassis management controller. The first, second, and third servers each have reclaimable power. The fourth server is configured to request a specific amount of power needed to complete a power-on request received at the fourth server. The chassis management controller is in communication with each of the first, second, third, and fourth servers. The chassis management controller is configured to reassign all the reclaimable power of the first server and to reassign a portion of the reclaimable power of the second and third servers to the fourth server. | 12-24-2009 |
20100037070 | DEMAND BASED POWER ALLOCATION - A demand based power re-allocation system includes one or more subsystems to assign a power allocation level to a plurality of servers, wherein the power allocation level is assigned by priority of the server. The system may throttle power for one or more of the plurality of servers approaching the power allocation level, wherein throttling includes limiting performance of a processor, track server power throttling for the plurality of servers. The method compares power throttling for a first server with power throttling for remaining servers in the plurality of servers and adjusts throttling of the plurality of servers, wherein throttled servers receive excess power from unthrottled servers. | 02-11-2010 |
20100211804 | System And Method For Dynamic Modular Information Handling System Power Distribution - Infrastructure power resources of a chassis information handling system are made available to run chassis information handling system modules when infrastructure devices are not using the power resources. For example, cooling fans that cool information handling system modules supported by an information handling system chassis run at variable speeds having variable power consumption. A power reserve maintained to run the cooling fans at full speed if needed is made available to information handling system modules when under power management by a chassis manager. | 08-19-2010 |
20110029798 | Power Consumption Monitor and Method Therefor - A power supply unit of an information handling system determines that a power consumption module of the information handling system is available. If the power consumption module is available, the power supply unit measures input power of the power supply unit and provides a representation of the input power to the power consumption module in response to receiving a power measurement request from the power consumption module. If the power supply unit determines that the power consumption module is not available, the power supply unit measures input power of the power supply unit and stores a representation of the input power at the power supply unit independent of a power measurement request from the power consumption module. | 02-03-2011 |
20110246807 | DEMAND BASED POWER ALLOCATION - A demand based power re-allocation system includes one or more subsystems to assign a power allocation level to a plurality of servers, wherein the power allocation level is assigned by priority of the server. The system may throttle power for one or more of the plurality of servers approaching the power allocation level, wherein throttling includes limiting performance of a processor, track server power throttling for the plurality of servers. The method compares power throttling for a first server with power throttling for remaining servers in the plurality of servers and adjusts throttling of the plurality of servers, wherein throttled servers receive excess power from unthrottled servers. | 10-06-2011 |
20130145185 | DEMAND BASED POWER ALLOCATION - A demand based power re-allocation system includes one or more subsystems to assign a power allocation level to a plurality of servers, wherein the power allocation level is assigned by priority of the server. The system may throttle power for one or more of the plurality of servers approaching the power allocation level, wherein throttling includes limiting performance of a processor, track server power throttling for the plurality of servers. The method compares power throttling for a first server with power throttling for remaining servers in the plurality of servers and adjusts throttling of the plurality of servers, wherein throttled servers receive excess power from unthrottled servers. | 06-06-2013 |
20130185576 | POWER PROFILING APPLICATION FOR MANAGING POWER ALLOCATION IN AN INFORMATION HANDLING SYSTEM - A method, system, and software instructions for allocating power in a information handling system are operable to respond to a power profiling request by transitioning a processing resource to a first power consumption state and obtaining and storing a first power consumption value. The first power consumption value is then retrieved and used to allocate power to the first processing resource in response to a power on request. The first power consumption state may be a state in which power consumption approximates a maximum power consumption. The processing resource may be further transitioned to a second power consumption state and a second power consumption value obtained. The second power consumption state may be a reduced performance state. Thereafter, responsive to determining that the system lacks sufficient power budget to fulfill a pending request for power, the processing resource is throttled and power is allocated using the second power consumption value. | 07-18-2013 |
20130262906 | Power Consumption Monitor and Method Therefor - A power supply unit of an information handling system determines that a power consumption module of the information handling system is available. If the power consumption module is available, the power supply unit measures input power of the power supply unit and provides a representation of the input power to the power consumption module in response to receiving a power measurement request from the power consumption module. If the power supply unit determines that the power consumption module is not available, the power supply unit measures input power of the power supply unit and stores a representation of the input power at the power supply unit independent of a power measurement request from the power consumption module. | 10-03-2013 |
20140059370 | WAKE-ON-LOCAL-AREA-NETWORK OPERATIONS IN A MODULAR CHASSIS USING A VIRTUALIZED INPUT-OUTPUT-VIRTUALIZATION ENVIRONMENT - A method for waking an information handling system includes receiving in a chassis a plurality of modular information handling systems and a plurality of modular information handling resources, routing access of one of the modular information handling resources to one or more of the plurality of modular information handling systems, monitoring a plurality of power management event lines, determining a wake message received at one of the modular information handling resources, determining which of the plurality of modular information handling systems is associated with the received wake message, forwarding a wake signal to the determined modular information handling system, and powering on the determined information handling system. The modular information handling resource is configured to receive a wake message. Each line is coupled one of the modular information handling resources. | 02-27-2014 |
Patent application number | Description | Published |
20150188708 | APPARATUS AND METHOD FOR PROTECTING MESSAGE DATA - Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data. | 07-02-2015 |
20150188709 | APPARATUS AND METHOD FOR PROTECTING MESSAGE DATA - Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data. | 07-02-2015 |
20160105276 | ROTATION-BASED CIPHER - A cipher employs rotation of a substitution box (S-Box) value to provide both confusion and diffusion. In some aspects, for each iteration of an iterative cipher, a subset of a state value is expanded to calculate a rotation distance for rotating an S-Box value, whereby the rotated S-Box value is combined with the state value and the new state value is rotated for the next iteration. Advantageously, the cipher may be implemented in software (or other code) using conventional instructions, and without the need for large S-Box lookup tables. | 04-14-2016 |
Patent application number | Description | Published |
20140079213 | Apparatus and method for protecting message data - Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the padding bits. The compressed data is encrypted to generate encrypted message data. | 03-20-2014 |
20140223192 | Method for protecting the integrity of a fixed-length data structure - One feature pertains to a mechanism to secure a data structure by using a computationally efficient algorithm. A plurality of keys and/or masks may be pre-generated upon boot-up or initiation of a session. An authentication code may be computed for each data structure (e.g., memory block or header block) by selecting a subset of the plurality of pre-generated keys and/or a mask from the plurality of pre-generated masks. The authentication code may be stored within the data structure for future verification of the integrity of the data structure. The keys and/or masks used for all authentication codes (e.g., for other data structures) may be selected from the same plurality of keys and/or masks during the same cycle or session. | 08-07-2014 |
20140237237 | MESSAGE AUTHENTICATION USING A UNIVERSAL HASH FUNCTION COMPUTED WITH CARRYLESS MULTIPLICATION - A method for authenticating a message by a wireless device is described. The wireless device obtains the input message. The wireless device generates a keystream. The wireless device computes a message authentication code using the keystream and a universal hash function. The universal hash function is computed using carryless multiplication. | 08-21-2014 |
20140258721 | LINEAR FEEDBACK SHIFT REGISTER (LFSR) - A wireless communication device is described. The wireless communication device includes a linear feedback shift register. The linear feedback shift register is initialized. The linear feedback shift register is a word based odd characteristic linear feedback shift register. The linear feedback shift register includes multiple 64-bit registers. A feedback function output is generated using the 64-bit registers. The feedback function output is placed into a highest register of the linear feedback shift register. | 09-11-2014 |
20150222421 | COUNTERMEASURES AGAINST SIDE-CHANNEL ATTACKS ON CRYPTOGRAPHIC ALGORITHMS - Techniques for encrypting data are provided that can be used to help prevent side-channel attacks on the cryptographic algorithms. An example method according to these techniques includes permuting an order of first intermediate data according to a predetermined permutation to produce permuted intermediate data. The first inter mediate data is output by one or more first stages of a cryptographic algorithm. The method also includes permuting a key to be used by one or more second stages of a cryptographic algorithm according to the predetermined permutation, applying the one or more second stages of a cryptographic algorithm to the permuted intermediate data to generate second intermediate data, the one or more second stages of the cryptographic algorithm using the permuted key, and permuting the second intermediate data according to an inverse permutation of the predetermined permutation to generate output. | 08-06-2015 |
20150302195 | HARDWARE-BASED STACK CONTROL INFORMATION PROTECTION - Techniques for protecting contents of a stack associated with a processor are provided. The techniques include a method including receiving a store instruction from a software program being executed by the processor, the store instruction including control information associated with a subroutine, altering the control information to generate secured control information responsive to receiving the store instruction from the software program, storing the secured control information on the stack, receiving a load instruction from the software program; and responsive to receiving the load instruction from the software program, loading the secured control information from the stack, altering the secured control information to recover the control information, and returning the control information to the software program. | 10-22-2015 |
Patent application number | Description | Published |
20150261965 | DYNAMIC ENCRYPTION KEYS FOR USE WITH XTS ENCRYPTION SYSTEMS EMPLOYING REDUCED-ROUND CIPHERS - One feature pertains to encrypting data to improve data confidentiality. In one aspect, a modified form of XTS encryption is provided for use with reduced-round block ciphers. A data unit index of data to be applied to the reduced-round cipher is encrypted under a secret key to generate or otherwise obtain a modified secret key for applying to the reduced-round cipher. That is, data to be encrypted by the reduced-round cipher is not encrypted under a static key but is instead encrypted under a dynamic key that varies according to the index of the data. If an attacker were to derive the value of the key applied to the reduced-round cipher by analyzing data encrypted by the cipher, the attacker would only obtain the dynamic key corresponding to one particular data unit index, rather than a global static key applied to an entire address space. Decryption procedures are also described. | 09-17-2015 |
20150261975 | DATA INTEGRITY PROTECTION FROM ROLLBACK ATTACKS FOR USE WITH SYSTEMS EMPLOYING MESSAGE AUTHENTICATION CODE TAGS - One feature pertains to an efficient procedure for storing data units in a storage device that allows for authentication of data units to prevent rollback attacks and other attacks such as cut-and-paste attacks. In one aspect, a message authentication code (MAC) is generated or otherwise obtained based on a primary key, a data unit to be stored, a corresponding index for the data unit (such as a page index) and a secondary key for the corresponding data unit, which is generated for each new write operation. The MAC and the corresponding data unit are stored in a bulk storage device such as a relatively insecure off-chip storage. Secondary keys are stored in a separate storage device such as a more secure on-chip storage. In some examples, new secondary keys are generated upon each data write based on a non-zero random or pseudorandom value. | 09-17-2015 |
20150288520 | ELLIPTIC CURVE POINT MULTIPLICATION PROCEDURE RESISTANT TO SIDE-CHANNEL INFORMATION LEAKAGE - One feature pertains to elliptic curve (EC) point multiplication for use in generating digital signatures. In one aspect, a scalar multiplier k) of a base point (P) of order (n) is selected on an elliptic curve for use with EC point multiplication. An integer value (r) is then randomly generated from within a range of values constrained so that, regardless of the particular value of (r) obtained within the range, EC point multiplication procedures performed using the scalar multiplier (k) summed with a product of the integer multiplier (r) and the order (n) consume device resources independent of the value of the scalar multiplier (k) to thereby reduce or eliminate side-channel leakage. This may be achieved by determining the range of values for r so that the bit position of the most significant bit of k+(r*n) will be even and fixed for a particular elliptic curve. | 10-08-2015 |
20150350171 | SEMI-DETERMINISTIC DIGITAL SIGNATURE GENERATION - Various features pertain to digital signatures for use in signing messages. In one aspect, a digital signature is generated based on a nonce derived using a per-message salt value, particularly a salt selected to provide a semi-deterministic nonce (i.e. a nonce that is neither fully deterministic nor completely random.) In one example, the nonce is generated by concatenating the salt value with a long-term private key and then applying the result to a key derivation function along with a hash of the message to be signed. The salt value may be, e.g., a counter, a context-specific message or may be randomly generated within a restricted range of values (relative to a full range of values associated with the particular digital signature generation protocol used to generate a digital signature from the nonce.) | 12-03-2015 |
Patent application number | Description | Published |
20090052282 | SYSTEM AND METHOD OF HORIZONTAL WAVE MEASUREMENT - A system and method of horizontal wave measurement is disclosed. The system for measuring the directional spectrum of waves in a fluid medium having a substantially planar surface may include a sonar system having a plurality of transducers for generating respective acoustic beams and receiving echoes from one or more range cells located substantially within the beams, at least one of the plurality of acoustic beams being angled non-orthogonally to at least one other of the plurality of acoustic beams. The method may calculate the directional spectrum associated with the waves from the received echoes. | 02-26-2009 |
20100302907 | METHOD AND SYSTEM FOR REMOTE SOUND SPEED MEASUREMENT - A system and method of remote sound speed measurement are disclosed. In one embodiment, a system for estimating a sound speed comprises a plurality of transducers configured to i) transmit a first acoustic signal from a first location, ii) transmit a second acoustic signal at a second location, iii) receive a first reflected signal at a third location, and iv) receive a second reflected signal at a fourth location, the reflected signals comprising at least one echo from at least one of the acoustic signals; and a microprocessor configured to i) estimate a travel time based on at least the first or second reflected signals, ii) estimate a travel time difference based on at least the first and second reflected signals, and iii) estimate a sound speed based on at least the estimated travel time and estimated travel time difference. | 12-02-2010 |
20130170320 | METHOD AND SYSTEM FOR REMOTE SOUND SPEED MEASUREMENT - A system and method of remote sound speed measurement are disclosed. In one embodiment, a system for estimating a sound speed comprises a plurality of transducers configured to i) transmit a first acoustic signal from a first location, ii) transmit a second acoustic signal at a second location, iii) receive a first reflected signal at a third location, and iv) receive a second reflected signal at a fourth location, the reflected signals comprising at least one echo from at least one of the acoustic signals; and a microprocessor configured to i) estimate a travel time based on at least the first or second reflected signals, ii) estimate a travel time difference based on at least the first and second reflected signals, and iii) estimate a sound speed based on at least the estimated travel time and estimated travel time difference. | 07-04-2013 |
Patent application number | Description | Published |
20120317647 | Automated Exploit Generation - A system and method for automatically generating exploits, such as exploits for target code, is described. In some implementations, the system received binary code and/or source code of a software applications, finds one or more exploitable bugs within the software application, and automatically generates exploits for the exploitable bugs. | 12-13-2012 |
20130312103 | DETECTING EXPLOITABLE BUGS IN BINARY CODE - Systems and methods for performing hybrid symbolic execution to detect exploitable bugs in binary code are described. In some example embodiments, the systems and methods determine that resources associated with an execution client performing symbolic execution of a target program are below, at, or above a threshold performance level, generate checkpoints for active executing paths of the online symbolic execution, and cause the execution client to perform symbolic execution in response to the determination that the resources are at or above the threshold performance level. | 11-21-2013 |
20150339217 | METHODS AND SYSTEMS FOR AUTOMATICALLY TESTING SOFTWARE - An automatic software testing machine may be configured to provide an advanced symbolic execution approach to software testing that combines dynamic symbolic execution and static symbolic execution, leveraging the strengths of each and avoiding the vulnerabilities of each. One or more software testing machines within a software testing system may be configured to automatically and dynamically alternate between dynamic symbolic execution and static symbolic execution, based on partial control flow graphs of portions of the software code to be tested. In some example embodiments, a software testing machine begins with dynamic symbolic execution, but switches to static symbolic execution opportunistically. In static mode, instead of checking entire programs for verification, the software testing machine may only check one or more program fragments for testing purposes. Thus, the software testing machine may benefit from the strengths of both dynamic and static symbolic execution. | 11-26-2015 |
Patent application number | Description | Published |
20090315764 | PRECISE ABSOLUTE TIME TRANSFER FROM A SATELLITE SYSTEM - Systems and methods according to one or more embodiments are provided for obtaining a precise absolute time using a satellite system. The precise absolute time may be used, for example, as an aid for positioning systems including navigation in attenuated or jammed environments. A method of obtaining precise absolute time transfer from a satellite according to an embodiment comprises: receiving a precision time signal from a satellite, wherein the precision time signal comprises a periodic repeating code; determining a timing phase of the code; receiving additional aiding information; and using the timing phase and the additional aiding information to determine a precise absolute time. | 12-24-2009 |
20090315769 | INTERNET HOTSPOTS LOCALIZATION USING SATELLITE SYSTEMS - Systems and methods according to various embodiments provide for navigation in attenuated environments by integrating satellite signals with Internet hotspot signals. In one embodiment, a receiver unit adapted to perform geolocation comprises an antenna adapted to receive a precision time signal from a satellite and receive additional aiding information from a wireless network station, wherein the precision time signal comprises a periodic repeating code. The receiver unit also comprises a processor and a memory adapted to store a plurality of computer readable instructions which when executed by the processor are adapted to cause the receiver unit to: use the precision time signal and the aiding information to determine a precise absolute time, determine positioning information associated with the receiver unit, use the positioning information to request location information of the wireless network station, and determine an absolute geolocation of the receiver unit using the positioning information and the location information. | 12-24-2009 |
20100171652 | LOCAL CLOCK FREQUENCY CALIBRATION USING LOW EARTH ORBIT (LEO) SATELLITES - Various techniques are provided for calibrating a frequency of a local clock using a satellite signal. In one example, a method of transferring frequency stability from a satellite to a device includes receiving a signal from the satellite. The method also includes determining a code phase from the satellite signal. The method further includes receiving aiding information. In addition, the method includes calibrating a frequency of a local clock of the device using the code phase and the aiding information to substantially synchronize the local clock frequency with a satellite clock frequency. | 07-08-2010 |
20110148701 | Precise Absolute Time Transfer From A Satellite System - Systems and methods according to one or more embodiments are provided for obtaining a precise absolute time using a satellite system. The precise absolute time may be used, for example, as an aid for positioning systems including navigation in attenuated or jammed environments. A method of obtaining precise absolute time transfer from a satellite according to an embodiment comprises: receiving a precision time signal from a satellite, wherein the precision time signal comprises a periodic repeating code; determining a timing phase of the code; receiving additional aiding information; and using the timing phase and the additional aiding information to determine a precise absolute time. | 06-23-2011 |
20110248887 | GEOLOCATION LEVERAGING SPOT BEAM OVERLAP - A method and system are disclosed for providing an estimate of a location of a user receiver device. The method and system involve emitting from at least one vehicle at least one spot beam on Earth, and receiving with the user receiver device a signal from at least one spot beam. In one or more embodiments, at least one vehicle may be a satellite and/or a pseudolite. The method and system further involve calculating with the user receiver device the estimate of the location of the user receiver device according to the user receiver device's location within at least one spot beam. In some embodiments, when the user receiver device receives signals from at least two spot beams, the user receiver device calculates the estimate of the location of the user receiver device to be located in the center of the intersection of at least two spot beams. | 10-13-2011 |